Feb 12 19:38:41.000043 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Feb 12 19:38:41.000063 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon Feb 12 18:07:00 -00 2024 Feb 12 19:38:41.000071 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Feb 12 19:38:41.000078 kernel: printk: bootconsole [pl11] enabled Feb 12 19:38:41.000083 kernel: efi: EFI v2.70 by EDK II Feb 12 19:38:41.000088 kernel: efi: ACPI 2.0=0x3fd89018 SMBIOS=0x3fd66000 SMBIOS 3.0=0x3fd64000 MEMATTR=0x3ef3c198 RNG=0x3fd89998 MEMRESERVE=0x37e73f98 Feb 12 19:38:41.000095 kernel: random: crng init done Feb 12 19:38:41.000100 kernel: ACPI: Early table checksum verification disabled Feb 12 19:38:41.000105 kernel: ACPI: RSDP 0x000000003FD89018 000024 (v02 VRTUAL) Feb 12 19:38:41.000111 kernel: ACPI: XSDT 0x000000003FD89F18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:38:41.000116 kernel: ACPI: FACP 0x000000003FD89C18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:38:41.000123 kernel: ACPI: DSDT 0x000000003EBD2018 01DEC0 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Feb 12 19:38:41.000128 kernel: ACPI: DBG2 0x000000003FD89B18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:38:41.000134 kernel: ACPI: GTDT 0x000000003FD89D98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:38:41.000140 kernel: ACPI: OEM0 0x000000003FD89098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:38:41.000146 kernel: ACPI: SPCR 0x000000003FD89A98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:38:41.000152 kernel: ACPI: APIC 0x000000003FD89818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:38:41.000160 kernel: ACPI: SRAT 0x000000003FD89198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:38:41.000165 kernel: ACPI: PPTT 0x000000003FD89418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Feb 12 19:38:41.000171 kernel: ACPI: BGRT 0x000000003FD89E98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:38:41.000177 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Feb 12 19:38:41.000182 kernel: NUMA: Failed to initialise from firmware Feb 12 19:38:41.000188 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Feb 12 19:38:41.000194 kernel: NUMA: NODE_DATA [mem 0x1bf7f3900-0x1bf7f8fff] Feb 12 19:38:41.000199 kernel: Zone ranges: Feb 12 19:38:41.000205 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Feb 12 19:38:41.000210 kernel: DMA32 empty Feb 12 19:38:41.000217 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Feb 12 19:38:41.000223 kernel: Movable zone start for each node Feb 12 19:38:41.000229 kernel: Early memory node ranges Feb 12 19:38:41.000234 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Feb 12 19:38:41.000240 kernel: node 0: [mem 0x0000000000824000-0x000000003ec80fff] Feb 12 19:38:41.000245 kernel: node 0: [mem 0x000000003ec81000-0x000000003eca9fff] Feb 12 19:38:41.000251 kernel: node 0: [mem 0x000000003ecaa000-0x000000003fd29fff] Feb 12 19:38:41.000257 kernel: node 0: [mem 0x000000003fd2a000-0x000000003fd7dfff] Feb 12 19:38:41.000262 kernel: node 0: [mem 0x000000003fd7e000-0x000000003fd89fff] Feb 12 19:38:41.000268 kernel: node 0: [mem 0x000000003fd8a000-0x000000003fd8dfff] Feb 12 19:38:41.000273 kernel: node 0: [mem 0x000000003fd8e000-0x000000003fffffff] Feb 12 19:38:41.000279 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Feb 12 19:38:41.000286 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Feb 12 19:38:41.000294 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Feb 12 19:38:41.000300 kernel: psci: probing for conduit method from ACPI. Feb 12 19:38:41.000306 kernel: psci: PSCIv1.1 detected in firmware. Feb 12 19:38:41.000312 kernel: psci: Using standard PSCI v0.2 function IDs Feb 12 19:38:41.000319 kernel: psci: MIGRATE_INFO_TYPE not supported. Feb 12 19:38:41.000325 kernel: psci: SMC Calling Convention v1.4 Feb 12 19:38:41.000331 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Feb 12 19:38:41.000337 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Feb 12 19:38:41.000343 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Feb 12 19:38:41.000349 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Feb 12 19:38:41.000355 kernel: pcpu-alloc: [0] 0 [0] 1 Feb 12 19:38:41.000361 kernel: Detected PIPT I-cache on CPU0 Feb 12 19:38:41.000367 kernel: CPU features: detected: GIC system register CPU interface Feb 12 19:38:41.000373 kernel: CPU features: detected: Hardware dirty bit management Feb 12 19:38:41.000379 kernel: CPU features: detected: Spectre-BHB Feb 12 19:38:41.000385 kernel: CPU features: kernel page table isolation forced ON by KASLR Feb 12 19:38:41.000393 kernel: CPU features: detected: Kernel page table isolation (KPTI) Feb 12 19:38:41.000399 kernel: CPU features: detected: ARM erratum 1418040 Feb 12 19:38:41.000405 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Feb 12 19:38:41.000411 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Feb 12 19:38:41.000417 kernel: Policy zone: Normal Feb 12 19:38:41.000424 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=0a07ee1673be713cb46dc1305004c8854c4690dc8835a87e3bc71aa6c6a62e40 Feb 12 19:38:41.000431 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 19:38:41.000437 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 12 19:38:41.000443 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 12 19:38:41.000449 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 19:38:41.000456 kernel: software IO TLB: mapped [mem 0x000000003abd2000-0x000000003ebd2000] (64MB) Feb 12 19:38:41.000463 kernel: Memory: 3991940K/4194160K available (9792K kernel code, 2092K rwdata, 7556K rodata, 34688K init, 778K bss, 202220K reserved, 0K cma-reserved) Feb 12 19:38:41.000469 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 12 19:38:41.000474 kernel: trace event string verifier disabled Feb 12 19:38:41.000480 kernel: rcu: Preemptible hierarchical RCU implementation. Feb 12 19:38:41.000487 kernel: rcu: RCU event tracing is enabled. Feb 12 19:38:41.000493 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 12 19:38:41.000499 kernel: Trampoline variant of Tasks RCU enabled. Feb 12 19:38:41.000505 kernel: Tracing variant of Tasks RCU enabled. Feb 12 19:38:41.000511 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 19:38:41.000518 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 12 19:38:41.000525 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Feb 12 19:38:41.000531 kernel: GICv3: 960 SPIs implemented Feb 12 19:38:41.000537 kernel: GICv3: 0 Extended SPIs implemented Feb 12 19:38:41.000543 kernel: GICv3: Distributor has no Range Selector support Feb 12 19:38:41.000549 kernel: Root IRQ handler: gic_handle_irq Feb 12 19:38:41.000555 kernel: GICv3: 16 PPIs implemented Feb 12 19:38:41.000561 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Feb 12 19:38:41.000567 kernel: ITS: No ITS available, not enabling LPIs Feb 12 19:38:41.000573 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 12 19:38:41.000580 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Feb 12 19:38:41.000586 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Feb 12 19:38:41.000592 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Feb 12 19:38:41.000599 kernel: Console: colour dummy device 80x25 Feb 12 19:38:41.000606 kernel: printk: console [tty1] enabled Feb 12 19:38:41.000612 kernel: ACPI: Core revision 20210730 Feb 12 19:38:41.000619 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Feb 12 19:38:41.000625 kernel: pid_max: default: 32768 minimum: 301 Feb 12 19:38:41.000631 kernel: LSM: Security Framework initializing Feb 12 19:38:41.000637 kernel: SELinux: Initializing. Feb 12 19:38:41.000643 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 12 19:38:41.000650 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 12 19:38:41.000657 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Feb 12 19:38:41.000664 kernel: Hyper-V: Host Build 10.0.22477.1369-1-0 Feb 12 19:38:41.000670 kernel: rcu: Hierarchical SRCU implementation. Feb 12 19:38:41.000676 kernel: Remapping and enabling EFI services. Feb 12 19:38:41.000682 kernel: smp: Bringing up secondary CPUs ... Feb 12 19:38:41.000688 kernel: Detected PIPT I-cache on CPU1 Feb 12 19:38:41.000695 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Feb 12 19:38:41.000701 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 12 19:38:41.000707 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Feb 12 19:38:41.000714 kernel: smp: Brought up 1 node, 2 CPUs Feb 12 19:38:41.000721 kernel: SMP: Total of 2 processors activated. Feb 12 19:38:41.000727 kernel: CPU features: detected: 32-bit EL0 Support Feb 12 19:38:41.000734 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Feb 12 19:38:41.000740 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Feb 12 19:38:41.000746 kernel: CPU features: detected: CRC32 instructions Feb 12 19:38:41.000753 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Feb 12 19:38:41.000759 kernel: CPU features: detected: LSE atomic instructions Feb 12 19:38:41.000765 kernel: CPU features: detected: Privileged Access Never Feb 12 19:38:41.000773 kernel: CPU: All CPU(s) started at EL1 Feb 12 19:38:41.000779 kernel: alternatives: patching kernel code Feb 12 19:38:41.000790 kernel: devtmpfs: initialized Feb 12 19:38:41.000798 kernel: KASLR enabled Feb 12 19:38:41.000805 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 19:38:41.000811 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 12 19:38:41.000818 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 19:38:41.000824 kernel: SMBIOS 3.1.0 present. Feb 12 19:38:41.000847 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 07/12/2023 Feb 12 19:38:41.000855 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 19:38:41.000863 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Feb 12 19:38:41.000870 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Feb 12 19:38:41.000877 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Feb 12 19:38:41.000883 kernel: audit: initializing netlink subsys (disabled) Feb 12 19:38:41.000890 kernel: audit: type=2000 audit(0.087:1): state=initialized audit_enabled=0 res=1 Feb 12 19:38:41.000896 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 19:38:41.000903 kernel: cpuidle: using governor menu Feb 12 19:38:41.000911 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Feb 12 19:38:41.000917 kernel: ASID allocator initialised with 32768 entries Feb 12 19:38:41.000924 kernel: ACPI: bus type PCI registered Feb 12 19:38:41.000931 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 19:38:41.000937 kernel: Serial: AMBA PL011 UART driver Feb 12 19:38:41.000944 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 12 19:38:41.000950 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Feb 12 19:38:41.000957 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 19:38:41.000963 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Feb 12 19:38:41.000971 kernel: cryptd: max_cpu_qlen set to 1000 Feb 12 19:38:41.000978 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Feb 12 19:38:41.000985 kernel: ACPI: Added _OSI(Module Device) Feb 12 19:38:41.000991 kernel: ACPI: Added _OSI(Processor Device) Feb 12 19:38:41.000998 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 19:38:41.001004 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 19:38:41.001010 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 19:38:41.001017 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 19:38:41.001023 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 19:38:41.001031 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 12 19:38:41.001038 kernel: ACPI: Interpreter enabled Feb 12 19:38:41.001045 kernel: ACPI: Using GIC for interrupt routing Feb 12 19:38:41.001051 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Feb 12 19:38:41.001058 kernel: printk: console [ttyAMA0] enabled Feb 12 19:38:41.001064 kernel: printk: bootconsole [pl11] disabled Feb 12 19:38:41.001071 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Feb 12 19:38:41.001077 kernel: iommu: Default domain type: Translated Feb 12 19:38:41.001084 kernel: iommu: DMA domain TLB invalidation policy: strict mode Feb 12 19:38:41.001091 kernel: vgaarb: loaded Feb 12 19:38:41.001098 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 19:38:41.001104 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 19:38:41.001111 kernel: PTP clock support registered Feb 12 19:38:41.001117 kernel: Registered efivars operations Feb 12 19:38:41.001124 kernel: No ACPI PMU IRQ for CPU0 Feb 12 19:38:41.001130 kernel: No ACPI PMU IRQ for CPU1 Feb 12 19:38:41.001137 kernel: clocksource: Switched to clocksource arch_sys_counter Feb 12 19:38:41.001143 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 19:38:41.001151 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 19:38:41.001158 kernel: pnp: PnP ACPI init Feb 12 19:38:41.001164 kernel: pnp: PnP ACPI: found 0 devices Feb 12 19:38:41.001171 kernel: NET: Registered PF_INET protocol family Feb 12 19:38:41.001177 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 12 19:38:41.001184 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 12 19:38:41.001191 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 19:38:41.001197 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 12 19:38:41.001204 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 12 19:38:41.001212 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 12 19:38:41.001218 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 12 19:38:41.001225 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 12 19:38:41.001232 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 19:38:41.001238 kernel: PCI: CLS 0 bytes, default 64 Feb 12 19:38:41.001245 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Feb 12 19:38:41.001251 kernel: kvm [1]: HYP mode not available Feb 12 19:38:41.001258 kernel: Initialise system trusted keyrings Feb 12 19:38:41.001264 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 12 19:38:41.001272 kernel: Key type asymmetric registered Feb 12 19:38:41.001279 kernel: Asymmetric key parser 'x509' registered Feb 12 19:38:41.001285 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 19:38:41.001292 kernel: io scheduler mq-deadline registered Feb 12 19:38:41.001298 kernel: io scheduler kyber registered Feb 12 19:38:41.001305 kernel: io scheduler bfq registered Feb 12 19:38:41.001311 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 19:38:41.001318 kernel: thunder_xcv, ver 1.0 Feb 12 19:38:41.001324 kernel: thunder_bgx, ver 1.0 Feb 12 19:38:41.001332 kernel: nicpf, ver 1.0 Feb 12 19:38:41.001338 kernel: nicvf, ver 1.0 Feb 12 19:38:41.001463 kernel: rtc-efi rtc-efi.0: registered as rtc0 Feb 12 19:38:41.001524 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-02-12T19:38:40 UTC (1707766720) Feb 12 19:38:41.001533 kernel: efifb: probing for efifb Feb 12 19:38:41.001540 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Feb 12 19:38:41.001546 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Feb 12 19:38:41.001553 kernel: efifb: scrolling: redraw Feb 12 19:38:41.001562 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Feb 12 19:38:41.001568 kernel: Console: switching to colour frame buffer device 128x48 Feb 12 19:38:41.001575 kernel: fb0: EFI VGA frame buffer device Feb 12 19:38:41.001581 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Feb 12 19:38:41.001588 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 12 19:38:41.001594 kernel: NET: Registered PF_INET6 protocol family Feb 12 19:38:41.001601 kernel: Segment Routing with IPv6 Feb 12 19:38:41.001607 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 19:38:41.001614 kernel: NET: Registered PF_PACKET protocol family Feb 12 19:38:41.001622 kernel: Key type dns_resolver registered Feb 12 19:38:41.001628 kernel: registered taskstats version 1 Feb 12 19:38:41.001635 kernel: Loading compiled-in X.509 certificates Feb 12 19:38:41.001641 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: c8c3faa6fd8ae0112832fff0e3d0e58448a7eb6c' Feb 12 19:38:41.001648 kernel: Key type .fscrypt registered Feb 12 19:38:41.001654 kernel: Key type fscrypt-provisioning registered Feb 12 19:38:41.001661 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 12 19:38:41.001667 kernel: ima: Allocated hash algorithm: sha1 Feb 12 19:38:41.001674 kernel: ima: No architecture policies found Feb 12 19:38:41.001681 kernel: Freeing unused kernel memory: 34688K Feb 12 19:38:41.001688 kernel: Run /init as init process Feb 12 19:38:41.001694 kernel: with arguments: Feb 12 19:38:41.001701 kernel: /init Feb 12 19:38:41.001707 kernel: with environment: Feb 12 19:38:41.001714 kernel: HOME=/ Feb 12 19:38:41.001720 kernel: TERM=linux Feb 12 19:38:41.001727 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 19:38:41.001735 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:38:41.001745 systemd[1]: Detected virtualization microsoft. Feb 12 19:38:41.001752 systemd[1]: Detected architecture arm64. Feb 12 19:38:41.001759 systemd[1]: Running in initrd. Feb 12 19:38:41.001766 systemd[1]: No hostname configured, using default hostname. Feb 12 19:38:41.001773 systemd[1]: Hostname set to . Feb 12 19:38:41.001780 systemd[1]: Initializing machine ID from random generator. Feb 12 19:38:41.001788 systemd[1]: Queued start job for default target initrd.target. Feb 12 19:38:41.001796 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:38:41.001803 systemd[1]: Reached target cryptsetup.target. Feb 12 19:38:41.001810 systemd[1]: Reached target paths.target. Feb 12 19:38:41.001817 systemd[1]: Reached target slices.target. Feb 12 19:38:41.001824 systemd[1]: Reached target swap.target. Feb 12 19:38:41.001845 systemd[1]: Reached target timers.target. Feb 12 19:38:41.001853 systemd[1]: Listening on iscsid.socket. Feb 12 19:38:41.001860 systemd[1]: Listening on iscsiuio.socket. Feb 12 19:38:41.001869 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 19:38:41.001876 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 19:38:41.001883 systemd[1]: Listening on systemd-journald.socket. Feb 12 19:38:41.001890 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:38:41.001897 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:38:41.001904 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:38:41.001911 systemd[1]: Reached target sockets.target. Feb 12 19:38:41.001918 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:38:41.001925 systemd[1]: Finished network-cleanup.service. Feb 12 19:38:41.001933 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 19:38:41.001940 systemd[1]: Starting systemd-journald.service... Feb 12 19:38:41.001947 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:38:41.001954 systemd[1]: Starting systemd-resolved.service... Feb 12 19:38:41.001961 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 19:38:41.001973 systemd-journald[276]: Journal started Feb 12 19:38:41.002019 systemd-journald[276]: Runtime Journal (/run/log/journal/573d2cc211864d1b8aa6aaa21054d6ca) is 8.0M, max 78.6M, 70.6M free. Feb 12 19:38:40.986420 systemd-modules-load[277]: Inserted module 'overlay' Feb 12 19:38:41.031230 systemd-resolved[278]: Positive Trust Anchors: Feb 12 19:38:41.047990 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 19:38:41.048013 kernel: Bridge firewalling registered Feb 12 19:38:41.048022 systemd[1]: Started systemd-journald.service. Feb 12 19:38:41.031247 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:38:41.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:41.031273 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:38:41.129735 kernel: audit: type=1130 audit(1707766721.047:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:41.129760 kernel: SCSI subsystem initialized Feb 12 19:38:41.129769 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 19:38:41.033340 systemd-resolved[278]: Defaulting to hostname 'linux'. Feb 12 19:38:41.162692 kernel: device-mapper: uevent: version 1.0.3 Feb 12 19:38:41.162714 kernel: audit: type=1130 audit(1707766721.133:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:41.162732 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 19:38:41.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:41.043893 systemd-modules-load[277]: Inserted module 'br_netfilter' Feb 12 19:38:41.191874 kernel: audit: type=1130 audit(1707766721.166:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:41.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:41.072052 systemd[1]: Started systemd-resolved.service. Feb 12 19:38:41.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:41.152863 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:38:41.237019 kernel: audit: type=1130 audit(1707766721.186:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:41.237047 kernel: audit: type=1130 audit(1707766721.195:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:41.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:41.167121 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 19:38:41.261032 kernel: audit: type=1130 audit(1707766721.218:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:41.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:41.183915 systemd-modules-load[277]: Inserted module 'dm_multipath' Feb 12 19:38:41.187333 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:38:41.196411 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 19:38:41.219336 systemd[1]: Reached target nss-lookup.target. Feb 12 19:38:41.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:41.261304 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 19:38:41.321999 kernel: audit: type=1130 audit(1707766721.297:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:41.266646 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:38:41.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:41.275493 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 19:38:41.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:41.293438 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:38:41.380430 kernel: audit: type=1130 audit(1707766721.326:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:41.380456 kernel: audit: type=1130 audit(1707766721.350:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:41.317645 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 19:38:41.327300 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 19:38:41.370027 systemd[1]: Starting dracut-cmdline.service... Feb 12 19:38:41.395431 dracut-cmdline[298]: dracut-dracut-053 Feb 12 19:38:41.399921 dracut-cmdline[298]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=0a07ee1673be713cb46dc1305004c8854c4690dc8835a87e3bc71aa6c6a62e40 Feb 12 19:38:41.498865 kernel: Loading iSCSI transport class v2.0-870. Feb 12 19:38:41.506875 kernel: iscsi: registered transport (tcp) Feb 12 19:38:41.525868 kernel: iscsi: registered transport (qla4xxx) Feb 12 19:38:41.525911 kernel: QLogic iSCSI HBA Driver Feb 12 19:38:41.562076 systemd[1]: Finished dracut-cmdline.service. Feb 12 19:38:41.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:41.567474 systemd[1]: Starting dracut-pre-udev.service... Feb 12 19:38:41.619853 kernel: raid6: neonx8 gen() 13819 MB/s Feb 12 19:38:41.639843 kernel: raid6: neonx8 xor() 10845 MB/s Feb 12 19:38:41.659841 kernel: raid6: neonx4 gen() 13561 MB/s Feb 12 19:38:41.680841 kernel: raid6: neonx4 xor() 11266 MB/s Feb 12 19:38:41.700840 kernel: raid6: neonx2 gen() 12962 MB/s Feb 12 19:38:41.720840 kernel: raid6: neonx2 xor() 10294 MB/s Feb 12 19:38:41.741840 kernel: raid6: neonx1 gen() 10505 MB/s Feb 12 19:38:41.761840 kernel: raid6: neonx1 xor() 8813 MB/s Feb 12 19:38:41.781840 kernel: raid6: int64x8 gen() 6291 MB/s Feb 12 19:38:41.802841 kernel: raid6: int64x8 xor() 3550 MB/s Feb 12 19:38:41.823840 kernel: raid6: int64x4 gen() 7255 MB/s Feb 12 19:38:41.843843 kernel: raid6: int64x4 xor() 3853 MB/s Feb 12 19:38:41.864841 kernel: raid6: int64x2 gen() 6155 MB/s Feb 12 19:38:41.884854 kernel: raid6: int64x2 xor() 3322 MB/s Feb 12 19:38:41.904840 kernel: raid6: int64x1 gen() 5046 MB/s Feb 12 19:38:41.930346 kernel: raid6: int64x1 xor() 2647 MB/s Feb 12 19:38:41.930358 kernel: raid6: using algorithm neonx8 gen() 13819 MB/s Feb 12 19:38:41.930366 kernel: raid6: .... xor() 10845 MB/s, rmw enabled Feb 12 19:38:41.934285 kernel: raid6: using neon recovery algorithm Feb 12 19:38:41.955372 kernel: xor: measuring software checksum speed Feb 12 19:38:41.955383 kernel: 8regs : 17308 MB/sec Feb 12 19:38:41.964174 kernel: 32regs : 20744 MB/sec Feb 12 19:38:41.964184 kernel: arm64_neon : 28045 MB/sec Feb 12 19:38:41.968974 kernel: xor: using function: arm64_neon (28045 MB/sec) Feb 12 19:38:42.023846 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Feb 12 19:38:42.032915 systemd[1]: Finished dracut-pre-udev.service. Feb 12 19:38:42.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:42.041000 audit: BPF prog-id=7 op=LOAD Feb 12 19:38:42.041000 audit: BPF prog-id=8 op=LOAD Feb 12 19:38:42.041983 systemd[1]: Starting systemd-udevd.service... Feb 12 19:38:42.060347 systemd-udevd[474]: Using default interface naming scheme 'v252'. Feb 12 19:38:42.067106 systemd[1]: Started systemd-udevd.service. Feb 12 19:38:42.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:42.076557 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 19:38:42.090275 dracut-pre-trigger[495]: rd.md=0: removing MD RAID activation Feb 12 19:38:42.116846 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 19:38:42.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:42.122111 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:38:42.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:42.157792 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:38:42.218859 kernel: hv_vmbus: Vmbus version:5.3 Feb 12 19:38:42.226867 kernel: hv_vmbus: registering driver hyperv_keyboard Feb 12 19:38:42.238856 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Feb 12 19:38:42.245851 kernel: hv_vmbus: registering driver hid_hyperv Feb 12 19:38:42.245893 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Feb 12 19:38:42.256853 kernel: hv_vmbus: registering driver hv_netvsc Feb 12 19:38:42.256899 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Feb 12 19:38:42.269360 kernel: hv_vmbus: registering driver hv_storvsc Feb 12 19:38:42.277850 kernel: scsi host0: storvsc_host_t Feb 12 19:38:42.285840 kernel: scsi host1: storvsc_host_t Feb 12 19:38:42.294853 kernel: scsi 1:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Feb 12 19:38:42.301851 kernel: scsi 1:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Feb 12 19:38:42.329571 kernel: sr 1:0:0:2: [sr0] scsi-1 drive Feb 12 19:38:42.329810 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 12 19:38:42.329822 kernel: sd 1:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Feb 12 19:38:42.334339 kernel: sd 1:0:0:0: [sda] 4096-byte physical blocks Feb 12 19:38:42.339730 kernel: sd 1:0:0:0: [sda] Write Protect is off Feb 12 19:38:42.347154 kernel: sd 1:0:0:0: [sda] Mode Sense: 0f 00 10 00 Feb 12 19:38:42.347311 kernel: sd 1:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Feb 12 19:38:42.347396 kernel: sr 1:0:0:2: Attached scsi CD-ROM sr0 Feb 12 19:38:42.361037 kernel: hv_netvsc 000d3ac4-cbb2-000d-3ac4-cbb2000d3ac4 eth0: VF slot 1 added Feb 12 19:38:42.361224 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 19:38:42.370855 kernel: sd 1:0:0:0: [sda] Attached SCSI disk Feb 12 19:38:42.378861 kernel: hv_vmbus: registering driver hv_pci Feb 12 19:38:42.390383 kernel: hv_pci 935b5348-784b-447f-8df1-6c6c615e6cac: PCI VMBus probing: Using version 0x10004 Feb 12 19:38:42.390592 kernel: hv_pci 935b5348-784b-447f-8df1-6c6c615e6cac: PCI host bridge to bus 784b:00 Feb 12 19:38:42.403585 kernel: pci_bus 784b:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Feb 12 19:38:42.403703 kernel: pci_bus 784b:00: No busn resource found for root bus, will use [bus 00-ff] Feb 12 19:38:42.418111 kernel: pci 784b:00:02.0: [15b3:1018] type 00 class 0x020000 Feb 12 19:38:42.430097 kernel: pci 784b:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Feb 12 19:38:42.451934 kernel: pci 784b:00:02.0: enabling Extended Tags Feb 12 19:38:42.468854 kernel: pci 784b:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 784b:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Feb 12 19:38:42.469046 kernel: pci_bus 784b:00: busn_res: [bus 00-ff] end is updated to 00 Feb 12 19:38:42.484918 kernel: pci 784b:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Feb 12 19:38:42.525858 kernel: mlx5_core 784b:00:02.0: firmware version: 16.30.1284 Feb 12 19:38:42.687852 kernel: mlx5_core 784b:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Feb 12 19:38:42.746402 kernel: hv_netvsc 000d3ac4-cbb2-000d-3ac4-cbb2000d3ac4 eth0: VF registering: eth1 Feb 12 19:38:42.746585 kernel: mlx5_core 784b:00:02.0 eth1: joined to eth0 Feb 12 19:38:42.757878 kernel: mlx5_core 784b:00:02.0 enP30795s1: renamed from eth1 Feb 12 19:38:42.854793 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 19:38:42.941858 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (535) Feb 12 19:38:42.954408 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:38:43.045448 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 19:38:43.061305 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 19:38:43.067117 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 19:38:43.079714 systemd[1]: Starting disk-uuid.service... Feb 12 19:38:43.115867 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 19:38:44.111853 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 19:38:44.111977 disk-uuid[600]: The operation has completed successfully. Feb 12 19:38:44.174718 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 19:38:44.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:44.178000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:44.174811 systemd[1]: Finished disk-uuid.service. Feb 12 19:38:44.179620 systemd[1]: Starting verity-setup.service... Feb 12 19:38:44.224852 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Feb 12 19:38:44.420942 systemd[1]: Found device dev-mapper-usr.device. Feb 12 19:38:44.427255 systemd[1]: Mounting sysusr-usr.mount... Feb 12 19:38:44.436430 systemd[1]: Finished verity-setup.service. Feb 12 19:38:44.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:44.496557 systemd[1]: Mounted sysusr-usr.mount. Feb 12 19:38:44.503750 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 19:38:44.500550 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 12 19:38:44.501321 systemd[1]: Starting ignition-setup.service... Feb 12 19:38:44.510068 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 19:38:44.548679 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 12 19:38:44.548732 kernel: BTRFS info (device sda6): using free space tree Feb 12 19:38:44.553104 kernel: BTRFS info (device sda6): has skinny extents Feb 12 19:38:44.597042 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 19:38:44.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:44.605000 audit: BPF prog-id=9 op=LOAD Feb 12 19:38:44.606589 systemd[1]: Starting systemd-networkd.service... Feb 12 19:38:44.632647 systemd-networkd[839]: lo: Link UP Feb 12 19:38:44.632661 systemd-networkd[839]: lo: Gained carrier Feb 12 19:38:44.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:44.633425 systemd-networkd[839]: Enumeration completed Feb 12 19:38:44.635933 systemd[1]: Started systemd-networkd.service. Feb 12 19:38:44.640636 systemd[1]: Reached target network.target. Feb 12 19:38:44.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:44.648548 systemd-networkd[839]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:38:44.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:44.685453 iscsid[847]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:38:44.685453 iscsid[847]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 12 19:38:44.685453 iscsid[847]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 19:38:44.685453 iscsid[847]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 19:38:44.685453 iscsid[847]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 19:38:44.685453 iscsid[847]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:38:44.685453 iscsid[847]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 19:38:44.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:44.649690 systemd[1]: Starting iscsiuio.service... Feb 12 19:38:44.658166 systemd[1]: Started iscsiuio.service. Feb 12 19:38:44.666976 systemd[1]: Starting iscsid.service... Feb 12 19:38:44.674293 systemd[1]: Started iscsid.service. Feb 12 19:38:44.679712 systemd[1]: Starting dracut-initqueue.service... Feb 12 19:38:44.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:44.736244 systemd[1]: Finished dracut-initqueue.service. Feb 12 19:38:44.741443 systemd[1]: Reached target remote-fs-pre.target. Feb 12 19:38:44.746631 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:38:44.757693 systemd[1]: Reached target remote-fs.target. Feb 12 19:38:44.771000 systemd[1]: Starting dracut-pre-mount.service... Feb 12 19:38:44.782346 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 12 19:38:44.794944 systemd[1]: Finished dracut-pre-mount.service. Feb 12 19:38:44.871856 kernel: mlx5_core 784b:00:02.0 enP30795s1: Link up Feb 12 19:38:44.888351 systemd[1]: Finished ignition-setup.service. Feb 12 19:38:44.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:44.893500 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 19:38:44.921242 kernel: hv_netvsc 000d3ac4-cbb2-000d-3ac4-cbb2000d3ac4 eth0: Data path switched to VF: enP30795s1 Feb 12 19:38:44.921405 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:38:44.921790 systemd-networkd[839]: enP30795s1: Link UP Feb 12 19:38:44.921919 systemd-networkd[839]: eth0: Link UP Feb 12 19:38:44.922045 systemd-networkd[839]: eth0: Gained carrier Feb 12 19:38:44.931031 systemd-networkd[839]: enP30795s1: Gained carrier Feb 12 19:38:44.945906 systemd-networkd[839]: eth0: DHCPv4 address 10.200.20.12/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 12 19:38:46.215936 systemd-networkd[839]: eth0: Gained IPv6LL Feb 12 19:38:47.904933 ignition[866]: Ignition 2.14.0 Feb 12 19:38:47.908033 ignition[866]: Stage: fetch-offline Feb 12 19:38:47.908116 ignition[866]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:38:47.908144 ignition[866]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:38:47.963395 ignition[866]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:38:47.963558 ignition[866]: parsed url from cmdline: "" Feb 12 19:38:47.963561 ignition[866]: no config URL provided Feb 12 19:38:47.963567 ignition[866]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 19:38:48.008377 kernel: kauditd_printk_skb: 18 callbacks suppressed Feb 12 19:38:48.008399 kernel: audit: type=1130 audit(1707766727.980:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:47.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:47.970518 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 19:38:47.963574 ignition[866]: no config at "/usr/lib/ignition/user.ign" Feb 12 19:38:47.982267 systemd[1]: Starting ignition-fetch.service... Feb 12 19:38:47.963580 ignition[866]: failed to fetch config: resource requires networking Feb 12 19:38:47.963805 ignition[866]: Ignition finished successfully Feb 12 19:38:48.002768 ignition[872]: Ignition 2.14.0 Feb 12 19:38:48.002775 ignition[872]: Stage: fetch Feb 12 19:38:48.002904 ignition[872]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:38:48.002928 ignition[872]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:38:48.005801 ignition[872]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:38:48.019027 ignition[872]: parsed url from cmdline: "" Feb 12 19:38:48.019036 ignition[872]: no config URL provided Feb 12 19:38:48.019045 ignition[872]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 19:38:48.019057 ignition[872]: no config at "/usr/lib/ignition/user.ign" Feb 12 19:38:48.019103 ignition[872]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Feb 12 19:38:48.041569 ignition[872]: GET result: OK Feb 12 19:38:48.041600 ignition[872]: failed to retrieve userdata from IMDS, falling back to custom data: not a config (empty) Feb 12 19:38:48.105760 ignition[872]: opening config device: "/dev/sr0" Feb 12 19:38:48.106330 ignition[872]: getting drive status for "/dev/sr0" Feb 12 19:38:48.106412 ignition[872]: drive status: OK Feb 12 19:38:48.106446 ignition[872]: mounting config device Feb 12 19:38:48.106457 ignition[872]: op(1): [started] mounting "/dev/sr0" at "/tmp/ignition-azure902677494" Feb 12 19:38:48.131852 kernel: UDF-fs: INFO Mounting volume 'UDF Volume', timestamp 2024/02/13 00:00 (1000) Feb 12 19:38:48.132150 ignition[872]: op(1): [finished] mounting "/dev/sr0" at "/tmp/ignition-azure902677494" Feb 12 19:38:48.132159 ignition[872]: checking for config drive Feb 12 19:38:48.133239 systemd[1]: tmp-ignition\x2dazure902677494.mount: Deactivated successfully. Feb 12 19:38:48.132630 ignition[872]: reading config Feb 12 19:38:48.132987 ignition[872]: op(2): [started] unmounting "/dev/sr0" at "/tmp/ignition-azure902677494" Feb 12 19:38:48.133527 ignition[872]: op(2): [finished] unmounting "/dev/sr0" at "/tmp/ignition-azure902677494" Feb 12 19:38:48.133540 ignition[872]: config has been read from custom data Feb 12 19:38:48.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:48.159223 unknown[872]: fetched base config from "system" Feb 12 19:38:48.195797 kernel: audit: type=1130 audit(1707766728.168:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:48.133574 ignition[872]: parsing config with SHA512: 52276fc8b806d08dea200772e65b2ffa56729adbe72829e1dfdaa99b32d2169171317adf4201c20a4bee9e7db3d8a1144f42a8a7ddc6e1fac57c7ed4ef6c9260 Feb 12 19:38:48.159230 unknown[872]: fetched base config from "system" Feb 12 19:38:48.159739 ignition[872]: fetch: fetch complete Feb 12 19:38:48.159236 unknown[872]: fetched user config from "azure" Feb 12 19:38:48.159744 ignition[872]: fetch: fetch passed Feb 12 19:38:48.164229 systemd[1]: Finished ignition-fetch.service. Feb 12 19:38:48.159784 ignition[872]: Ignition finished successfully Feb 12 19:38:48.169718 systemd[1]: Starting ignition-kargs.service... Feb 12 19:38:48.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:48.207619 ignition[880]: Ignition 2.14.0 Feb 12 19:38:48.261199 kernel: audit: type=1130 audit(1707766728.232:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:48.223825 systemd[1]: Finished ignition-kargs.service. Feb 12 19:38:48.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:48.207625 ignition[880]: Stage: kargs Feb 12 19:38:48.293029 kernel: audit: type=1130 audit(1707766728.265:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:48.233338 systemd[1]: Starting ignition-disks.service... Feb 12 19:38:48.207730 ignition[880]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:38:48.258307 systemd[1]: Finished ignition-disks.service. Feb 12 19:38:48.207747 ignition[880]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:38:48.266098 systemd[1]: Reached target initrd-root-device.target. Feb 12 19:38:48.219106 ignition[880]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:38:48.293939 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:38:48.220293 ignition[880]: kargs: kargs passed Feb 12 19:38:48.301927 systemd[1]: Reached target local-fs.target. Feb 12 19:38:48.220350 ignition[880]: Ignition finished successfully Feb 12 19:38:48.312611 systemd[1]: Reached target sysinit.target. Feb 12 19:38:48.243386 ignition[886]: Ignition 2.14.0 Feb 12 19:38:48.321484 systemd[1]: Reached target basic.target. Feb 12 19:38:48.243392 ignition[886]: Stage: disks Feb 12 19:38:48.336062 systemd[1]: Starting systemd-fsck-root.service... Feb 12 19:38:48.243503 ignition[886]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:38:48.243525 ignition[886]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:38:48.246248 ignition[886]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:38:48.252665 ignition[886]: disks: disks passed Feb 12 19:38:48.252730 ignition[886]: Ignition finished successfully Feb 12 19:38:48.436452 systemd-fsck[894]: ROOT: clean, 602/7326000 files, 481070/7359488 blocks Feb 12 19:38:48.445568 systemd[1]: Finished systemd-fsck-root.service. Feb 12 19:38:48.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:48.474069 systemd[1]: Mounting sysroot.mount... Feb 12 19:38:48.480734 kernel: audit: type=1130 audit(1707766728.453:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:48.499876 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 19:38:48.500492 systemd[1]: Mounted sysroot.mount. Feb 12 19:38:48.504600 systemd[1]: Reached target initrd-root-fs.target. Feb 12 19:38:48.539055 systemd[1]: Mounting sysroot-usr.mount... Feb 12 19:38:48.543968 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 12 19:38:48.553273 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 19:38:48.553306 systemd[1]: Reached target ignition-diskful.target. Feb 12 19:38:48.559024 systemd[1]: Mounted sysroot-usr.mount. Feb 12 19:38:48.593650 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 19:38:48.598605 systemd[1]: Starting initrd-setup-root.service... Feb 12 19:38:48.621911 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (904) Feb 12 19:38:48.634095 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 12 19:38:48.634125 kernel: BTRFS info (device sda6): using free space tree Feb 12 19:38:48.634215 initrd-setup-root[909]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 19:38:48.644100 kernel: BTRFS info (device sda6): has skinny extents Feb 12 19:38:48.656632 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 19:38:48.666923 initrd-setup-root[935]: cut: /sysroot/etc/group: No such file or directory Feb 12 19:38:48.676490 initrd-setup-root[943]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 19:38:48.685322 initrd-setup-root[951]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 19:38:49.104584 systemd[1]: Finished initrd-setup-root.service. Feb 12 19:38:49.130976 kernel: audit: type=1130 audit(1707766729.108:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:49.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:49.109856 systemd[1]: Starting ignition-mount.service... Feb 12 19:38:49.134243 systemd[1]: Starting sysroot-boot.service... Feb 12 19:38:49.147690 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 12 19:38:49.147852 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 12 19:38:49.165767 systemd[1]: Finished sysroot-boot.service. Feb 12 19:38:49.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:49.191944 kernel: audit: type=1130 audit(1707766729.170:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:49.198340 ignition[972]: INFO : Ignition 2.14.0 Feb 12 19:38:49.198340 ignition[972]: INFO : Stage: mount Feb 12 19:38:49.207761 ignition[972]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:38:49.207761 ignition[972]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:38:49.207761 ignition[972]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:38:49.207761 ignition[972]: INFO : mount: mount passed Feb 12 19:38:49.207761 ignition[972]: INFO : Ignition finished successfully Feb 12 19:38:49.266959 kernel: audit: type=1130 audit(1707766729.218:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:49.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:49.214671 systemd[1]: Finished ignition-mount.service. Feb 12 19:38:49.795268 coreos-metadata[903]: Feb 12 19:38:49.795 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Feb 12 19:38:49.803542 coreos-metadata[903]: Feb 12 19:38:49.803 INFO Fetch successful Feb 12 19:38:49.831150 coreos-metadata[903]: Feb 12 19:38:49.831 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Feb 12 19:38:49.852249 coreos-metadata[903]: Feb 12 19:38:49.852 INFO Fetch successful Feb 12 19:38:49.857716 coreos-metadata[903]: Feb 12 19:38:49.857 INFO wrote hostname ci-3510.3.2-a-b351613fb4 to /sysroot/etc/hostname Feb 12 19:38:49.866450 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 12 19:38:49.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:49.896031 kernel: audit: type=1130 audit(1707766729.871:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:49.891593 systemd[1]: Starting ignition-files.service... Feb 12 19:38:49.902050 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 19:38:49.918868 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (982) Feb 12 19:38:49.930624 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 12 19:38:49.930639 kernel: BTRFS info (device sda6): using free space tree Feb 12 19:38:49.930654 kernel: BTRFS info (device sda6): has skinny extents Feb 12 19:38:49.941803 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 19:38:49.955295 ignition[1001]: INFO : Ignition 2.14.0 Feb 12 19:38:49.955295 ignition[1001]: INFO : Stage: files Feb 12 19:38:49.964746 ignition[1001]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:38:49.964746 ignition[1001]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:38:49.964746 ignition[1001]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:38:49.964746 ignition[1001]: DEBUG : files: compiled without relabeling support, skipping Feb 12 19:38:49.964746 ignition[1001]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 19:38:49.964746 ignition[1001]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 19:38:50.053983 ignition[1001]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 19:38:50.061669 ignition[1001]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 19:38:50.073187 unknown[1001]: wrote ssh authorized keys file for user: core Feb 12 19:38:50.078844 ignition[1001]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 19:38:50.078844 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Feb 12 19:38:50.078844 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Feb 12 19:38:50.523247 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 12 19:38:50.815748 ignition[1001]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Feb 12 19:38:50.832977 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Feb 12 19:38:50.832977 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Feb 12 19:38:50.832977 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Feb 12 19:38:51.182601 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 12 19:38:51.318841 ignition[1001]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Feb 12 19:38:51.334922 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Feb 12 19:38:51.334922 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:38:51.334922 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubeadm: attempt #1 Feb 12 19:38:51.501361 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 12 19:38:51.830236 ignition[1001]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 5a08b81f9cc82d3cce21130856ca63b8dafca9149d9775dd25b376eb0f18209aa0e4a47c0a6d7e6fb1316aacd5d59dec770f26c09120c866949d70bc415518b3 Feb 12 19:38:51.846841 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:38:51.846841 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:38:51.846841 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubelet: attempt #1 Feb 12 19:38:51.888191 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 12 19:38:52.482600 ignition[1001]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 5a898ef543a6482895101ea58e33602e3c0a7682d322aaf08ac3dc8a5a3c8da8f09600d577024549288f8cebb1a86f9c79927796b69a3d8fe989ca8f12b147d6 Feb 12 19:38:52.499142 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:38:52.499142 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/install.sh" Feb 12 19:38:52.499142 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/install.sh" Feb 12 19:38:52.499142 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:38:52.553044 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1003) Feb 12 19:38:52.543231 systemd[1]: mnt-oem1012417552.mount: Deactivated successfully. Feb 12 19:38:52.558785 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:38:52.558785 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:38:52.558785 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:38:52.558785 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 12 19:38:52.558785 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Feb 12 19:38:52.558785 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1012417552" Feb 12 19:38:52.558785 ignition[1001]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1012417552": device or resource busy Feb 12 19:38:52.558785 ignition[1001]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1012417552", trying btrfs: device or resource busy Feb 12 19:38:52.558785 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1012417552" Feb 12 19:38:52.558785 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1012417552" Feb 12 19:38:52.558785 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem1012417552" Feb 12 19:38:52.558785 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem1012417552" Feb 12 19:38:52.558785 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 12 19:38:52.558785 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 12 19:38:52.558785 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition Feb 12 19:38:52.797343 kernel: audit: type=1130 audit(1707766732.605:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:52.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:52.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:52.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:52.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:52.748000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:52.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:52.586523 systemd[1]: mnt-oem1830778073.mount: Deactivated successfully. Feb 12 19:38:52.804675 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1830778073" Feb 12 19:38:52.804675 ignition[1001]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1830778073": device or resource busy Feb 12 19:38:52.804675 ignition[1001]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1830778073", trying btrfs: device or resource busy Feb 12 19:38:52.804675 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1830778073" Feb 12 19:38:52.804675 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1830778073" Feb 12 19:38:52.804675 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem1830778073" Feb 12 19:38:52.804675 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem1830778073" Feb 12 19:38:52.804675 ignition[1001]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 12 19:38:52.804675 ignition[1001]: INFO : files: op(12): [started] processing unit "waagent.service" Feb 12 19:38:52.804675 ignition[1001]: INFO : files: op(12): [finished] processing unit "waagent.service" Feb 12 19:38:52.804675 ignition[1001]: INFO : files: op(13): [started] processing unit "nvidia.service" Feb 12 19:38:52.804675 ignition[1001]: INFO : files: op(13): [finished] processing unit "nvidia.service" Feb 12 19:38:52.804675 ignition[1001]: INFO : files: op(14): [started] processing unit "prepare-cni-plugins.service" Feb 12 19:38:52.804675 ignition[1001]: INFO : files: op(14): op(15): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:38:52.804675 ignition[1001]: INFO : files: op(14): op(15): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:38:52.804675 ignition[1001]: INFO : files: op(14): [finished] processing unit "prepare-cni-plugins.service" Feb 12 19:38:52.804675 ignition[1001]: INFO : files: op(16): [started] processing unit "prepare-critools.service" Feb 12 19:38:52.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:52.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:52.593236 systemd[1]: Finished ignition-files.service. Feb 12 19:38:53.028624 ignition[1001]: INFO : files: op(16): op(17): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:38:53.028624 ignition[1001]: INFO : files: op(16): op(17): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:38:53.028624 ignition[1001]: INFO : files: op(16): [finished] processing unit "prepare-critools.service" Feb 12 19:38:53.028624 ignition[1001]: INFO : files: op(18): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:38:53.028624 ignition[1001]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:38:53.028624 ignition[1001]: INFO : files: op(19): [started] setting preset to enabled for "prepare-critools.service" Feb 12 19:38:53.028624 ignition[1001]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-critools.service" Feb 12 19:38:53.028624 ignition[1001]: INFO : files: op(1a): [started] setting preset to enabled for "waagent.service" Feb 12 19:38:53.028624 ignition[1001]: INFO : files: op(1a): [finished] setting preset to enabled for "waagent.service" Feb 12 19:38:53.028624 ignition[1001]: INFO : files: op(1b): [started] setting preset to enabled for "nvidia.service" Feb 12 19:38:53.028624 ignition[1001]: INFO : files: op(1b): [finished] setting preset to enabled for "nvidia.service" Feb 12 19:38:53.028624 ignition[1001]: INFO : files: createResultFile: createFiles: op(1c): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:38:53.028624 ignition[1001]: INFO : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:38:53.028624 ignition[1001]: INFO : files: files passed Feb 12 19:38:53.028624 ignition[1001]: INFO : Ignition finished successfully Feb 12 19:38:53.348655 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 12 19:38:53.348691 kernel: audit: type=1131 audit(1707766733.104:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:53.348703 kernel: audit: type=1131 audit(1707766733.151:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:53.348713 kernel: audit: type=1131 audit(1707766733.181:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:53.348724 kernel: audit: type=1131 audit(1707766733.209:49): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:53.348739 kernel: audit: type=1131 audit(1707766733.240:50): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:53.348751 kernel: audit: type=1131 audit(1707766733.279:51): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:53.348762 kernel: audit: type=1131 audit(1707766733.311:52): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:53.104000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:53.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:53.181000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:53.209000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:53.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:53.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:53.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:53.348966 initrd-setup-root-after-ignition[1026]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 19:38:52.634139 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 19:38:53.362000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:52.639298 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 19:38:52.640127 systemd[1]: Starting ignition-quench.service... Feb 12 19:38:53.452982 kernel: audit: type=1131 audit(1707766733.362:53): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:53.453008 kernel: audit: type=1131 audit(1707766733.403:54): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:53.453018 kernel: audit: type=1131 audit(1707766733.426:55): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:53.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:53.426000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:52.668380 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 19:38:53.458000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:52.668485 systemd[1]: Finished ignition-quench.service. Feb 12 19:38:52.673764 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 19:38:52.693148 systemd[1]: Reached target ignition-complete.target. Feb 12 19:38:53.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:53.481082 ignition[1039]: INFO : Ignition 2.14.0 Feb 12 19:38:53.481082 ignition[1039]: INFO : Stage: umount Feb 12 19:38:53.481082 ignition[1039]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:38:53.481082 ignition[1039]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:38:53.481082 ignition[1039]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:38:53.481082 ignition[1039]: INFO : umount: umount passed Feb 12 19:38:53.481082 ignition[1039]: INFO : Ignition finished successfully Feb 12 19:38:52.710066 systemd[1]: Starting initrd-parse-etc.service... Feb 12 19:38:53.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:52.736291 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 19:38:52.736391 systemd[1]: Finished initrd-parse-etc.service. Feb 12 19:38:53.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:53.578000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:52.749586 systemd[1]: Reached target initrd-fs.target. Feb 12 19:38:53.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:52.764346 systemd[1]: Reached target initrd.target. Feb 12 19:38:53.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:53.603000 audit: BPF prog-id=6 op=UNLOAD Feb 12 19:38:52.782440 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 19:38:52.783393 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 19:38:52.856164 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 19:38:53.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:52.872157 systemd[1]: Starting initrd-cleanup.service... Feb 12 19:38:53.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:52.897789 systemd[1]: Stopped target nss-lookup.target. Feb 12 19:38:52.911001 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 19:38:53.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:52.922694 systemd[1]: Stopped target timers.target. Feb 12 19:38:52.933804 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 19:38:53.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:52.933940 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 19:38:53.678000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:52.945167 systemd[1]: Stopped target initrd.target. Feb 12 19:38:52.956209 systemd[1]: Stopped target basic.target. Feb 12 19:38:52.967859 systemd[1]: Stopped target ignition-complete.target. Feb 12 19:38:53.705000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:52.983849 systemd[1]: Stopped target ignition-diskful.target. Feb 12 19:38:53.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:53.000102 systemd[1]: Stopped target initrd-root-device.target. Feb 12 19:38:53.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:53.012768 systemd[1]: Stopped target remote-fs.target. Feb 12 19:38:53.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:53.024741 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 19:38:53.766704 kernel: hv_netvsc 000d3ac4-cbb2-000d-3ac4-cbb2000d3ac4 eth0: Data path switched from VF: enP30795s1 Feb 12 19:38:53.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:53.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:53.033382 systemd[1]: Stopped target sysinit.target. Feb 12 19:38:53.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:53.048485 systemd[1]: Stopped target local-fs.target. Feb 12 19:38:53.781000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:53.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:53.064470 systemd[1]: Stopped target local-fs-pre.target. Feb 12 19:38:53.076573 systemd[1]: Stopped target swap.target. Feb 12 19:38:53.089685 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 19:38:53.089797 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 19:38:53.104806 systemd[1]: Stopped target cryptsetup.target. Feb 12 19:38:53.139165 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 19:38:53.139267 systemd[1]: Stopped dracut-initqueue.service. Feb 12 19:38:53.151558 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 19:38:53.151652 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 19:38:53.181736 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 19:38:53.181837 systemd[1]: Stopped ignition-files.service. Feb 12 19:38:53.210021 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 12 19:38:53.210120 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 12 19:38:53.262827 systemd[1]: Stopping ignition-mount.service... Feb 12 19:38:53.269252 systemd[1]: Stopping sysroot-boot.service... Feb 12 19:38:53.274672 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 19:38:53.274876 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 19:38:53.297296 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 19:38:53.878000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:38:53.297448 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 19:38:53.341191 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 12 19:38:53.341990 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 19:38:53.342092 systemd[1]: Stopped ignition-mount.service. Feb 12 19:38:53.391264 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 19:38:53.391346 systemd[1]: Stopped ignition-disks.service. Feb 12 19:38:53.404022 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 19:38:53.404068 systemd[1]: Stopped ignition-kargs.service. Feb 12 19:38:53.426767 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 12 19:38:53.426825 systemd[1]: Stopped ignition-fetch.service. Feb 12 19:38:53.952173 iscsid[847]: iscsid shutting down. Feb 12 19:38:53.458175 systemd[1]: Stopped target network.target. Feb 12 19:38:53.466758 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 19:38:53.466825 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 19:38:53.476491 systemd[1]: Stopped target paths.target. Feb 12 19:38:53.485342 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 19:38:53.493310 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 19:38:53.498297 systemd[1]: Stopped target slices.target. Feb 12 19:38:53.509471 systemd[1]: Stopped target sockets.target. Feb 12 19:38:53.528922 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 19:38:53.528984 systemd[1]: Closed iscsid.socket. Feb 12 19:38:53.540283 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 19:38:53.540309 systemd[1]: Closed iscsiuio.socket. Feb 12 19:38:53.548577 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 19:38:53.548624 systemd[1]: Stopped ignition-setup.service. Feb 12 19:38:53.558206 systemd[1]: Stopping systemd-networkd.service... Feb 12 19:38:53.566031 systemd[1]: Stopping systemd-resolved.service... Feb 12 19:38:53.574887 systemd-networkd[839]: eth0: DHCPv6 lease lost Feb 12 19:38:53.952000 audit: BPF prog-id=9 op=UNLOAD Feb 12 19:38:53.575355 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 19:38:53.575432 systemd[1]: Finished initrd-cleanup.service. Feb 12 19:38:53.581035 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 19:38:53.581121 systemd[1]: Stopped systemd-networkd.service. Feb 12 19:38:53.952847 systemd-journald[276]: Received SIGTERM from PID 1 (n/a). Feb 12 19:38:53.590254 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 19:38:53.590345 systemd[1]: Stopped systemd-resolved.service. Feb 12 19:38:53.599511 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 19:38:53.599549 systemd[1]: Closed systemd-networkd.socket. Feb 12 19:38:53.608856 systemd[1]: Stopping network-cleanup.service... Feb 12 19:38:53.620173 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 19:38:53.620254 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 19:38:53.629691 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 19:38:53.629738 systemd[1]: Stopped systemd-sysctl.service. Feb 12 19:38:53.642436 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 19:38:53.642489 systemd[1]: Stopped systemd-modules-load.service. Feb 12 19:38:53.652542 systemd[1]: Stopping systemd-udevd.service... Feb 12 19:38:53.663044 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 12 19:38:53.663603 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 19:38:53.663721 systemd[1]: Stopped systemd-udevd.service. Feb 12 19:38:53.669980 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 19:38:53.670078 systemd[1]: Stopped sysroot-boot.service. Feb 12 19:38:53.680162 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 19:38:53.680220 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 19:38:53.687638 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 19:38:53.687679 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 19:38:53.696570 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 19:38:53.696634 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 19:38:53.705546 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 19:38:53.705588 systemd[1]: Stopped dracut-cmdline.service. Feb 12 19:38:53.714671 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 19:38:53.714714 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 19:38:53.723957 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 19:38:53.724000 systemd[1]: Stopped initrd-setup-root.service. Feb 12 19:38:53.733913 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 19:38:53.742443 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 12 19:38:53.742506 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 12 19:38:53.758047 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 19:38:53.758096 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 19:38:53.762685 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 19:38:53.762728 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 19:38:53.772364 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 12 19:38:53.772867 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 19:38:53.772975 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 19:38:53.869494 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 19:38:53.869610 systemd[1]: Stopped network-cleanup.service. Feb 12 19:38:53.878550 systemd[1]: Reached target initrd-switch-root.target. Feb 12 19:38:53.889966 systemd[1]: Starting initrd-switch-root.service... Feb 12 19:38:53.910641 systemd[1]: Switching root. Feb 12 19:38:53.953915 systemd-journald[276]: Journal stopped Feb 12 19:39:05.569186 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 19:39:05.569206 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 19:39:05.569217 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 19:39:05.569229 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 19:39:05.569236 kernel: SELinux: policy capability open_perms=1 Feb 12 19:39:05.569244 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 19:39:05.569253 kernel: SELinux: policy capability always_check_network=0 Feb 12 19:39:05.569261 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 19:39:05.569268 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 19:39:05.569276 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 19:39:05.569286 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 19:39:05.569295 systemd[1]: Successfully loaded SELinux policy in 261.794ms. Feb 12 19:39:05.569305 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 21.164ms. Feb 12 19:39:05.569315 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:39:05.569326 systemd[1]: Detected virtualization microsoft. Feb 12 19:39:05.569335 systemd[1]: Detected architecture arm64. Feb 12 19:39:05.569343 systemd[1]: Detected first boot. Feb 12 19:39:05.569352 systemd[1]: Hostname set to . Feb 12 19:39:05.569361 systemd[1]: Initializing machine ID from random generator. Feb 12 19:39:05.569370 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 19:39:05.569378 kernel: kauditd_printk_skb: 31 callbacks suppressed Feb 12 19:39:05.569387 kernel: audit: type=1400 audit(1707766738.130:87): avc: denied { associate } for pid=1072 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 19:39:05.569398 kernel: audit: type=1300 audit(1707766738.130:87): arch=c00000b7 syscall=5 success=yes exit=0 a0=400014589c a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1055 pid=1072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:05.569408 kernel: audit: type=1327 audit(1707766738.130:87): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:39:05.569418 kernel: audit: type=1400 audit(1707766738.140:88): avc: denied { associate } for pid=1072 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 19:39:05.569428 kernel: audit: type=1300 audit(1707766738.140:88): arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145975 a2=1ed a3=0 items=2 ppid=1055 pid=1072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:05.569436 kernel: audit: type=1307 audit(1707766738.140:88): cwd="/" Feb 12 19:39:05.569446 kernel: audit: type=1302 audit(1707766738.140:88): item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:05.569455 kernel: audit: type=1302 audit(1707766738.140:88): item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:05.569464 kernel: audit: type=1327 audit(1707766738.140:88): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:39:05.569473 systemd[1]: Populated /etc with preset unit settings. Feb 12 19:39:05.569483 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:39:05.569492 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:39:05.569502 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:39:05.569512 kernel: audit: type=1334 audit(1707766744.844:89): prog-id=12 op=LOAD Feb 12 19:39:05.569520 kernel: audit: type=1334 audit(1707766744.844:90): prog-id=3 op=UNLOAD Feb 12 19:39:05.569528 kernel: audit: type=1334 audit(1707766744.850:91): prog-id=13 op=LOAD Feb 12 19:39:05.569536 kernel: audit: type=1334 audit(1707766744.856:92): prog-id=14 op=LOAD Feb 12 19:39:05.569545 kernel: audit: type=1334 audit(1707766744.856:93): prog-id=4 op=UNLOAD Feb 12 19:39:05.569553 kernel: audit: type=1334 audit(1707766744.856:94): prog-id=5 op=UNLOAD Feb 12 19:39:05.569564 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 19:39:05.569573 kernel: audit: type=1334 audit(1707766744.862:95): prog-id=15 op=LOAD Feb 12 19:39:05.570340 kernel: audit: type=1334 audit(1707766744.862:96): prog-id=12 op=UNLOAD Feb 12 19:39:05.570371 kernel: audit: type=1334 audit(1707766744.868:97): prog-id=16 op=LOAD Feb 12 19:39:05.570381 kernel: audit: type=1334 audit(1707766744.874:98): prog-id=17 op=LOAD Feb 12 19:39:05.570393 systemd[1]: Stopped iscsiuio.service. Feb 12 19:39:05.570404 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 19:39:05.570418 systemd[1]: Stopped iscsid.service. Feb 12 19:39:05.570429 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 19:39:05.570442 systemd[1]: Stopped initrd-switch-root.service. Feb 12 19:39:05.570452 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 19:39:05.570462 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 19:39:05.570474 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 19:39:05.570484 systemd[1]: Created slice system-getty.slice. Feb 12 19:39:05.570493 systemd[1]: Created slice system-modprobe.slice. Feb 12 19:39:05.570502 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 19:39:05.570512 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 19:39:05.570524 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 19:39:05.570535 systemd[1]: Created slice user.slice. Feb 12 19:39:05.570544 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:39:05.570553 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 19:39:05.570562 systemd[1]: Set up automount boot.automount. Feb 12 19:39:05.570574 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 19:39:05.570585 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 19:39:05.570594 systemd[1]: Stopped target initrd-fs.target. Feb 12 19:39:05.570603 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 19:39:05.570614 systemd[1]: Reached target integritysetup.target. Feb 12 19:39:05.570626 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:39:05.570636 systemd[1]: Reached target remote-fs.target. Feb 12 19:39:05.570645 systemd[1]: Reached target slices.target. Feb 12 19:39:05.570654 systemd[1]: Reached target swap.target. Feb 12 19:39:05.570664 systemd[1]: Reached target torcx.target. Feb 12 19:39:05.570674 systemd[1]: Reached target veritysetup.target. Feb 12 19:39:05.570687 systemd[1]: Listening on systemd-coredump.socket. Feb 12 19:39:05.570696 systemd[1]: Listening on systemd-initctl.socket. Feb 12 19:39:05.570706 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:39:05.570715 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:39:05.570724 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:39:05.570737 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 19:39:05.570746 systemd[1]: Mounting dev-hugepages.mount... Feb 12 19:39:05.570757 systemd[1]: Mounting dev-mqueue.mount... Feb 12 19:39:05.570766 systemd[1]: Mounting media.mount... Feb 12 19:39:05.570775 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 19:39:05.570788 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 19:39:05.570797 systemd[1]: Mounting tmp.mount... Feb 12 19:39:05.570806 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 19:39:05.570816 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 19:39:05.570844 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:39:05.570855 systemd[1]: Starting modprobe@configfs.service... Feb 12 19:39:05.570865 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 19:39:05.570875 systemd[1]: Starting modprobe@drm.service... Feb 12 19:39:05.570884 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 19:39:05.570894 systemd[1]: Starting modprobe@fuse.service... Feb 12 19:39:05.570907 systemd[1]: Starting modprobe@loop.service... Feb 12 19:39:05.570917 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 19:39:05.570926 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 19:39:05.570936 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 19:39:05.570946 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 19:39:05.570955 kernel: loop: module loaded Feb 12 19:39:05.570968 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 19:39:05.570977 systemd[1]: Stopped systemd-journald.service. Feb 12 19:39:05.570986 kernel: fuse: init (API version 7.34) Feb 12 19:39:05.570995 systemd[1]: systemd-journald.service: Consumed 2.966s CPU time. Feb 12 19:39:05.571004 systemd[1]: Starting systemd-journald.service... Feb 12 19:39:05.571013 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:39:05.571025 systemd[1]: Starting systemd-network-generator.service... Feb 12 19:39:05.571036 systemd[1]: Starting systemd-remount-fs.service... Feb 12 19:39:05.571045 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:39:05.571056 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 19:39:05.571068 systemd[1]: Stopped verity-setup.service. Feb 12 19:39:05.571080 systemd[1]: Mounted dev-hugepages.mount. Feb 12 19:39:05.571090 systemd[1]: Mounted dev-mqueue.mount. Feb 12 19:39:05.571099 systemd[1]: Mounted media.mount. Feb 12 19:39:05.571109 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 19:39:05.571118 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 19:39:05.571132 systemd[1]: Mounted tmp.mount. Feb 12 19:39:05.571141 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 19:39:05.571151 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:39:05.571167 systemd-journald[1174]: Journal started Feb 12 19:39:05.571224 systemd-journald[1174]: Runtime Journal (/run/log/journal/555693b063544967ba3e144468e5b21f) is 8.0M, max 78.6M, 70.6M free. Feb 12 19:38:56.089000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 19:38:56.722000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:38:56.722000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:38:56.722000 audit: BPF prog-id=10 op=LOAD Feb 12 19:38:56.722000 audit: BPF prog-id=10 op=UNLOAD Feb 12 19:38:56.722000 audit: BPF prog-id=11 op=LOAD Feb 12 19:38:56.722000 audit: BPF prog-id=11 op=UNLOAD Feb 12 19:38:58.130000 audit[1072]: AVC avc: denied { associate } for pid=1072 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 19:38:58.130000 audit[1072]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=400014589c a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1055 pid=1072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:58.130000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:38:58.140000 audit[1072]: AVC avc: denied { associate } for pid=1072 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 19:38:58.140000 audit[1072]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145975 a2=1ed a3=0 items=2 ppid=1055 pid=1072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:58.140000 audit: CWD cwd="/" Feb 12 19:38:58.140000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:38:58.140000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:38:58.140000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:39:04.844000 audit: BPF prog-id=12 op=LOAD Feb 12 19:39:04.844000 audit: BPF prog-id=3 op=UNLOAD Feb 12 19:39:04.850000 audit: BPF prog-id=13 op=LOAD Feb 12 19:39:04.856000 audit: BPF prog-id=14 op=LOAD Feb 12 19:39:04.856000 audit: BPF prog-id=4 op=UNLOAD Feb 12 19:39:04.856000 audit: BPF prog-id=5 op=UNLOAD Feb 12 19:39:04.862000 audit: BPF prog-id=15 op=LOAD Feb 12 19:39:04.862000 audit: BPF prog-id=12 op=UNLOAD Feb 12 19:39:04.868000 audit: BPF prog-id=16 op=LOAD Feb 12 19:39:04.874000 audit: BPF prog-id=17 op=LOAD Feb 12 19:39:04.874000 audit: BPF prog-id=13 op=UNLOAD Feb 12 19:39:04.874000 audit: BPF prog-id=14 op=UNLOAD Feb 12 19:39:04.874000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:04.914000 audit: BPF prog-id=15 op=UNLOAD Feb 12 19:39:04.918000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:04.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:04.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:04.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:05.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:05.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:05.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:05.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:05.437000 audit: BPF prog-id=18 op=LOAD Feb 12 19:39:05.437000 audit: BPF prog-id=19 op=LOAD Feb 12 19:39:05.437000 audit: BPF prog-id=20 op=LOAD Feb 12 19:39:05.437000 audit: BPF prog-id=16 op=UNLOAD Feb 12 19:39:05.437000 audit: BPF prog-id=17 op=UNLOAD Feb 12 19:39:05.507000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:05.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:05.565000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 19:39:05.565000 audit[1174]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=3 a1=ffffd7cac2b0 a2=4000 a3=1 items=0 ppid=1 pid=1174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:05.565000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 19:38:58.098863 /usr/lib/systemd/system-generators/torcx-generator[1072]: time="2024-02-12T19:38:58Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:39:04.843439 systemd[1]: Queued start job for default target multi-user.target. Feb 12 19:38:58.100414 /usr/lib/systemd/system-generators/torcx-generator[1072]: time="2024-02-12T19:38:58Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:39:04.875429 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 19:38:58.100433 /usr/lib/systemd/system-generators/torcx-generator[1072]: time="2024-02-12T19:38:58Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:39:04.875792 systemd[1]: systemd-journald.service: Consumed 2.966s CPU time. Feb 12 19:38:58.100467 /usr/lib/systemd/system-generators/torcx-generator[1072]: time="2024-02-12T19:38:58Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 19:38:58.100477 /usr/lib/systemd/system-generators/torcx-generator[1072]: time="2024-02-12T19:38:58Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 19:38:58.100507 /usr/lib/systemd/system-generators/torcx-generator[1072]: time="2024-02-12T19:38:58Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 19:38:58.100519 /usr/lib/systemd/system-generators/torcx-generator[1072]: time="2024-02-12T19:38:58Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 19:38:58.100712 /usr/lib/systemd/system-generators/torcx-generator[1072]: time="2024-02-12T19:38:58Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 19:38:58.100745 /usr/lib/systemd/system-generators/torcx-generator[1072]: time="2024-02-12T19:38:58Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:38:58.100756 /usr/lib/systemd/system-generators/torcx-generator[1072]: time="2024-02-12T19:38:58Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:38:58.113801 /usr/lib/systemd/system-generators/torcx-generator[1072]: time="2024-02-12T19:38:58Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 19:38:58.113850 /usr/lib/systemd/system-generators/torcx-generator[1072]: time="2024-02-12T19:38:58Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 19:38:58.113869 /usr/lib/systemd/system-generators/torcx-generator[1072]: time="2024-02-12T19:38:58Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 19:38:58.113883 /usr/lib/systemd/system-generators/torcx-generator[1072]: time="2024-02-12T19:38:58Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 19:38:58.113900 /usr/lib/systemd/system-generators/torcx-generator[1072]: time="2024-02-12T19:38:58Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 19:38:58.113914 /usr/lib/systemd/system-generators/torcx-generator[1072]: time="2024-02-12T19:38:58Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 19:39:03.922429 /usr/lib/systemd/system-generators/torcx-generator[1072]: time="2024-02-12T19:39:03Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:39:03.922686 /usr/lib/systemd/system-generators/torcx-generator[1072]: time="2024-02-12T19:39:03Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:39:03.922778 /usr/lib/systemd/system-generators/torcx-generator[1072]: time="2024-02-12T19:39:03Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:39:03.922946 /usr/lib/systemd/system-generators/torcx-generator[1072]: time="2024-02-12T19:39:03Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:39:03.922994 /usr/lib/systemd/system-generators/torcx-generator[1072]: time="2024-02-12T19:39:03Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 19:39:03.923048 /usr/lib/systemd/system-generators/torcx-generator[1072]: time="2024-02-12T19:39:03Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 19:39:05.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:05.584501 systemd[1]: Started systemd-journald.service. Feb 12 19:39:05.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:05.585357 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 19:39:05.585495 systemd[1]: Finished modprobe@configfs.service. Feb 12 19:39:05.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:05.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:05.590130 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 19:39:05.590435 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 19:39:05.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:05.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:05.595160 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 19:39:05.595293 systemd[1]: Finished modprobe@drm.service. Feb 12 19:39:05.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:05.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:05.599774 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 19:39:05.600174 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 19:39:05.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:05.604000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:05.605007 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 19:39:05.605116 systemd[1]: Finished modprobe@fuse.service. Feb 12 19:39:05.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:05.608000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:05.609538 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 19:39:05.609693 systemd[1]: Finished modprobe@loop.service. Feb 12 19:39:05.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:05.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:05.614347 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:39:05.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:05.619437 systemd[1]: Finished systemd-network-generator.service. Feb 12 19:39:05.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:05.624532 systemd[1]: Finished systemd-remount-fs.service. Feb 12 19:39:05.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:05.629388 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:39:05.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:05.634606 systemd[1]: Reached target network-pre.target. Feb 12 19:39:05.640599 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 19:39:05.645965 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 19:39:05.649666 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 19:39:05.664080 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 19:39:05.669208 systemd[1]: Starting systemd-journal-flush.service... Feb 12 19:39:05.673306 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 19:39:05.674380 systemd[1]: Starting systemd-random-seed.service... Feb 12 19:39:05.678624 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 19:39:05.679664 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:39:05.684478 systemd[1]: Starting systemd-sysusers.service... Feb 12 19:39:05.689424 systemd[1]: Starting systemd-udev-settle.service... Feb 12 19:39:05.695938 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 19:39:05.700440 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 19:39:05.706328 udevadm[1192]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 12 19:39:05.729871 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:39:05.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:05.750027 systemd-journald[1174]: Time spent on flushing to /var/log/journal/555693b063544967ba3e144468e5b21f is 13.918ms for 1127 entries. Feb 12 19:39:05.750027 systemd-journald[1174]: System Journal (/var/log/journal/555693b063544967ba3e144468e5b21f) is 8.0M, max 2.6G, 2.6G free. Feb 12 19:39:05.832699 systemd-journald[1174]: Received client request to flush runtime journal. Feb 12 19:39:05.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:05.770948 systemd[1]: Finished systemd-random-seed.service. Feb 12 19:39:05.776186 systemd[1]: Reached target first-boot-complete.target. Feb 12 19:39:05.833644 systemd[1]: Finished systemd-journal-flush.service. Feb 12 19:39:05.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:06.244227 systemd[1]: Finished systemd-sysusers.service. Feb 12 19:39:06.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:06.249705 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 19:39:06.559767 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 19:39:06.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:06.695223 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 19:39:06.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:06.699000 audit: BPF prog-id=21 op=LOAD Feb 12 19:39:06.699000 audit: BPF prog-id=22 op=LOAD Feb 12 19:39:06.699000 audit: BPF prog-id=7 op=UNLOAD Feb 12 19:39:06.699000 audit: BPF prog-id=8 op=UNLOAD Feb 12 19:39:06.701152 systemd[1]: Starting systemd-udevd.service... Feb 12 19:39:06.718923 systemd-udevd[1197]: Using default interface naming scheme 'v252'. Feb 12 19:39:06.904437 systemd[1]: Started systemd-udevd.service. Feb 12 19:39:06.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:06.913000 audit: BPF prog-id=23 op=LOAD Feb 12 19:39:06.916049 systemd[1]: Starting systemd-networkd.service... Feb 12 19:39:06.945008 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Feb 12 19:39:06.990000 audit[1205]: AVC avc: denied { confidentiality } for pid=1205 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 19:39:06.998000 audit: BPF prog-id=24 op=LOAD Feb 12 19:39:06.998000 audit: BPF prog-id=25 op=LOAD Feb 12 19:39:06.998000 audit: BPF prog-id=26 op=LOAD Feb 12 19:39:06.999941 systemd[1]: Starting systemd-userdbd.service... Feb 12 19:39:07.003847 kernel: hv_vmbus: registering driver hv_balloon Feb 12 19:39:07.012887 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Feb 12 19:39:07.012984 kernel: hv_balloon: Memory hot add disabled on ARM64 Feb 12 19:39:07.018261 kernel: hv_vmbus: registering driver hyperv_fb Feb 12 19:39:07.025013 kernel: mousedev: PS/2 mouse device common for all mice Feb 12 19:39:06.990000 audit[1205]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaab028ac800 a1=aa2c a2=ffff843224b0 a3=aaab0280b010 items=12 ppid=1197 pid=1205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:06.990000 audit: CWD cwd="/" Feb 12 19:39:06.990000 audit: PATH item=0 name=(null) inode=5877 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:06.990000 audit: PATH item=1 name=(null) inode=11556 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:06.990000 audit: PATH item=2 name=(null) inode=11556 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:06.990000 audit: PATH item=3 name=(null) inode=11557 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:06.990000 audit: PATH item=4 name=(null) inode=11556 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:06.990000 audit: PATH item=5 name=(null) inode=11558 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:06.990000 audit: PATH item=6 name=(null) inode=11556 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:06.990000 audit: PATH item=7 name=(null) inode=11559 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:06.990000 audit: PATH item=8 name=(null) inode=11556 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:06.990000 audit: PATH item=9 name=(null) inode=11560 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:06.990000 audit: PATH item=10 name=(null) inode=11556 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:06.990000 audit: PATH item=11 name=(null) inode=11561 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:06.990000 audit: PROCTITLE proctitle="(udev-worker)" Feb 12 19:39:07.055889 kernel: hv_utils: Registering HyperV Utility Driver Feb 12 19:39:07.056002 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Feb 12 19:39:07.063950 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Feb 12 19:39:07.064018 kernel: hv_vmbus: registering driver hv_utils Feb 12 19:39:07.072932 kernel: Console: switching to colour dummy device 80x25 Feb 12 19:39:07.073028 kernel: hv_utils: Heartbeat IC version 3.0 Feb 12 19:39:07.079288 kernel: hv_utils: Shutdown IC version 3.2 Feb 12 19:39:07.079378 kernel: hv_utils: TimeSync IC version 4.0 Feb 12 19:39:07.374531 kernel: Console: switching to colour frame buffer device 128x48 Feb 12 19:39:07.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:07.378807 systemd[1]: Started systemd-userdbd.service. Feb 12 19:39:07.612057 systemd-networkd[1218]: lo: Link UP Feb 12 19:39:07.612072 systemd-networkd[1218]: lo: Gained carrier Feb 12 19:39:07.612450 systemd-networkd[1218]: Enumeration completed Feb 12 19:39:07.612550 systemd[1]: Started systemd-networkd.service. Feb 12 19:39:07.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:07.619002 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 19:39:07.642991 systemd-networkd[1218]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:39:07.658778 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1213) Feb 12 19:39:07.682257 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:39:07.689177 systemd[1]: Finished systemd-udev-settle.service. Feb 12 19:39:07.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:07.696146 systemd[1]: Starting lvm2-activation-early.service... Feb 12 19:39:07.710757 kernel: mlx5_core 784b:00:02.0 enP30795s1: Link up Feb 12 19:39:07.738514 systemd-networkd[1218]: enP30795s1: Link UP Feb 12 19:39:07.738608 systemd-networkd[1218]: eth0: Link UP Feb 12 19:39:07.738764 kernel: hv_netvsc 000d3ac4-cbb2-000d-3ac4-cbb2000d3ac4 eth0: Data path switched to VF: enP30795s1 Feb 12 19:39:07.738611 systemd-networkd[1218]: eth0: Gained carrier Feb 12 19:39:07.747003 systemd-networkd[1218]: enP30795s1: Gained carrier Feb 12 19:39:07.760860 systemd-networkd[1218]: eth0: DHCPv4 address 10.200.20.12/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 12 19:39:08.085056 lvm[1275]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:39:08.122660 systemd[1]: Finished lvm2-activation-early.service. Feb 12 19:39:08.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:08.127774 systemd[1]: Reached target cryptsetup.target. Feb 12 19:39:08.133214 systemd[1]: Starting lvm2-activation.service... Feb 12 19:39:08.137207 lvm[1276]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:39:08.160647 systemd[1]: Finished lvm2-activation.service. Feb 12 19:39:08.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:08.165227 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:39:08.169806 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 19:39:08.169832 systemd[1]: Reached target local-fs.target. Feb 12 19:39:08.174399 systemd[1]: Reached target machines.target. Feb 12 19:39:08.180016 systemd[1]: Starting ldconfig.service... Feb 12 19:39:08.184259 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 19:39:08.184323 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:39:08.185507 systemd[1]: Starting systemd-boot-update.service... Feb 12 19:39:08.190831 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 19:39:08.197384 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 19:39:08.202110 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:39:08.202169 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:39:08.203321 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 19:39:08.216181 systemd-tmpfiles[1281]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 19:39:08.232149 systemd-tmpfiles[1281]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 19:39:08.233252 systemd-tmpfiles[1281]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 19:39:08.243068 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1278 (bootctl) Feb 12 19:39:08.244295 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 19:39:08.798087 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 19:39:08.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:08.939977 systemd-fsck[1286]: fsck.fat 4.2 (2021-01-31) Feb 12 19:39:08.939977 systemd-fsck[1286]: /dev/sda1: 236 files, 113719/258078 clusters Feb 12 19:39:08.942321 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 19:39:08.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:08.949597 systemd[1]: Mounting boot.mount... Feb 12 19:39:08.967816 systemd[1]: Mounted boot.mount. Feb 12 19:39:08.981250 systemd[1]: Finished systemd-boot-update.service. Feb 12 19:39:08.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:09.238761 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 19:39:09.239337 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 19:39:09.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:09.542183 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 19:39:09.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:09.548488 systemd[1]: Starting audit-rules.service... Feb 12 19:39:09.553142 systemd[1]: Starting clean-ca-certificates.service... Feb 12 19:39:09.559107 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 19:39:09.563000 audit: BPF prog-id=27 op=LOAD Feb 12 19:39:09.565886 systemd[1]: Starting systemd-resolved.service... Feb 12 19:39:09.569000 audit: BPF prog-id=28 op=LOAD Feb 12 19:39:09.571385 systemd[1]: Starting systemd-timesyncd.service... Feb 12 19:39:09.576676 systemd[1]: Starting systemd-update-utmp.service... Feb 12 19:39:09.605000 audit[1298]: SYSTEM_BOOT pid=1298 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 19:39:09.608725 systemd[1]: Finished systemd-update-utmp.service. Feb 12 19:39:09.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:09.625536 systemd[1]: Finished clean-ca-certificates.service. Feb 12 19:39:09.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:09.630346 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 19:39:09.663489 systemd[1]: Started systemd-timesyncd.service. Feb 12 19:39:09.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:09.668274 systemd[1]: Reached target time-set.target. Feb 12 19:39:09.672501 systemd-networkd[1218]: eth0: Gained IPv6LL Feb 12 19:39:09.674194 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 19:39:09.678000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:09.694063 systemd-resolved[1296]: Positive Trust Anchors: Feb 12 19:39:09.694079 systemd-resolved[1296]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:39:09.694119 systemd-resolved[1296]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:39:09.736099 systemd-resolved[1296]: Using system hostname 'ci-3510.3.2-a-b351613fb4'. Feb 12 19:39:09.737635 systemd[1]: Started systemd-resolved.service. Feb 12 19:39:09.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:09.742120 systemd[1]: Reached target network.target. Feb 12 19:39:09.747890 systemd[1]: Reached target network-online.target. Feb 12 19:39:09.752955 systemd[1]: Reached target nss-lookup.target. Feb 12 19:39:09.757647 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 19:39:09.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:09.874000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 19:39:09.874000 audit[1313]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd878c830 a2=420 a3=0 items=0 ppid=1292 pid=1313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:09.874000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 19:39:09.875110 augenrules[1313]: No rules Feb 12 19:39:09.876016 systemd[1]: Finished audit-rules.service. Feb 12 19:39:10.206013 systemd-timesyncd[1297]: Contacted time server 216.66.48.42:123 (0.flatcar.pool.ntp.org). Feb 12 19:39:10.206085 systemd-timesyncd[1297]: Initial clock synchronization to Mon 2024-02-12 19:39:10.200598 UTC. Feb 12 19:39:16.387854 ldconfig[1277]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 19:39:16.399509 systemd[1]: Finished ldconfig.service. Feb 12 19:39:16.405910 systemd[1]: Starting systemd-update-done.service... Feb 12 19:39:16.437366 systemd[1]: Finished systemd-update-done.service. Feb 12 19:39:16.442224 systemd[1]: Reached target sysinit.target. Feb 12 19:39:16.446508 systemd[1]: Started motdgen.path. Feb 12 19:39:16.450367 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 19:39:16.456732 systemd[1]: Started logrotate.timer. Feb 12 19:39:16.460670 systemd[1]: Started mdadm.timer. Feb 12 19:39:16.464219 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 19:39:16.468987 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 19:39:16.469021 systemd[1]: Reached target paths.target. Feb 12 19:39:16.473012 systemd[1]: Reached target timers.target. Feb 12 19:39:16.477674 systemd[1]: Listening on dbus.socket. Feb 12 19:39:16.482757 systemd[1]: Starting docker.socket... Feb 12 19:39:16.488670 systemd[1]: Listening on sshd.socket. Feb 12 19:39:16.492620 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:39:16.493107 systemd[1]: Listening on docker.socket. Feb 12 19:39:16.497253 systemd[1]: Reached target sockets.target. Feb 12 19:39:16.501778 systemd[1]: Reached target basic.target. Feb 12 19:39:16.505805 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:39:16.505848 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:39:16.507300 systemd[1]: Starting containerd.service... Feb 12 19:39:16.512848 systemd[1]: Starting dbus.service... Feb 12 19:39:16.517794 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 19:39:16.523187 systemd[1]: Starting extend-filesystems.service... Feb 12 19:39:16.529944 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 19:39:16.531167 systemd[1]: Starting motdgen.service... Feb 12 19:39:16.535957 systemd[1]: Started nvidia.service. Feb 12 19:39:16.541451 systemd[1]: Starting prepare-cni-plugins.service... Feb 12 19:39:16.547866 systemd[1]: Starting prepare-critools.service... Feb 12 19:39:16.553405 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 19:39:16.559104 systemd[1]: Starting sshd-keygen.service... Feb 12 19:39:16.565037 systemd[1]: Starting systemd-logind.service... Feb 12 19:39:16.569007 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:39:16.569079 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 12 19:39:16.569569 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 19:39:16.570211 systemd[1]: Starting update-engine.service... Feb 12 19:39:16.575260 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 19:39:16.585337 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 19:39:16.585513 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 19:39:16.623371 jq[1339]: true Feb 12 19:39:16.624522 jq[1323]: false Feb 12 19:39:16.637525 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 19:39:16.637698 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 19:39:16.664757 extend-filesystems[1324]: Found sda Feb 12 19:39:16.675369 extend-filesystems[1324]: Found sda1 Feb 12 19:39:16.675369 extend-filesystems[1324]: Found sda2 Feb 12 19:39:16.675369 extend-filesystems[1324]: Found sda3 Feb 12 19:39:16.675369 extend-filesystems[1324]: Found usr Feb 12 19:39:16.675369 extend-filesystems[1324]: Found sda4 Feb 12 19:39:16.675369 extend-filesystems[1324]: Found sda6 Feb 12 19:39:16.675369 extend-filesystems[1324]: Found sda7 Feb 12 19:39:16.675369 extend-filesystems[1324]: Found sda9 Feb 12 19:39:16.675369 extend-filesystems[1324]: Checking size of /dev/sda9 Feb 12 19:39:16.668525 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 19:39:16.727955 jq[1346]: true Feb 12 19:39:16.668713 systemd[1]: Finished motdgen.service. Feb 12 19:39:16.738602 env[1347]: time="2024-02-12T19:39:16.736236376Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 19:39:16.752268 tar[1341]: ./ Feb 12 19:39:16.752268 tar[1341]: ./loopback Feb 12 19:39:16.754768 tar[1342]: crictl Feb 12 19:39:16.764375 systemd-logind[1334]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 12 19:39:16.764624 systemd-logind[1334]: New seat seat0. Feb 12 19:39:16.798293 env[1347]: time="2024-02-12T19:39:16.797977555Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 19:39:16.798615 env[1347]: time="2024-02-12T19:39:16.798590368Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:39:16.800918 env[1347]: time="2024-02-12T19:39:16.800872381Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:39:16.800918 env[1347]: time="2024-02-12T19:39:16.800910011Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:39:16.801157 env[1347]: time="2024-02-12T19:39:16.801127599Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:39:16.801157 env[1347]: time="2024-02-12T19:39:16.801151553Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 19:39:16.801222 env[1347]: time="2024-02-12T19:39:16.801164630Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 19:39:16.801222 env[1347]: time="2024-02-12T19:39:16.801174868Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 19:39:16.801261 env[1347]: time="2024-02-12T19:39:16.801245971Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:39:16.801465 env[1347]: time="2024-02-12T19:39:16.801439564Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:39:16.801606 env[1347]: time="2024-02-12T19:39:16.801582290Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:39:16.801650 env[1347]: time="2024-02-12T19:39:16.801607244Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 19:39:16.801672 env[1347]: time="2024-02-12T19:39:16.801661431Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 19:39:16.801695 env[1347]: time="2024-02-12T19:39:16.801673508Z" level=info msg="metadata content store policy set" policy=shared Feb 12 19:39:16.814603 extend-filesystems[1324]: Old size kept for /dev/sda9 Feb 12 19:39:16.814603 extend-filesystems[1324]: Found sr0 Feb 12 19:39:16.819331 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 19:39:16.819486 systemd[1]: Finished extend-filesystems.service. Feb 12 19:39:16.833846 env[1347]: time="2024-02-12T19:39:16.833800956Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 19:39:16.833846 env[1347]: time="2024-02-12T19:39:16.833850024Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 19:39:16.833983 env[1347]: time="2024-02-12T19:39:16.833863621Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 19:39:16.833983 env[1347]: time="2024-02-12T19:39:16.833900612Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 19:39:16.833983 env[1347]: time="2024-02-12T19:39:16.833916928Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 19:39:16.833983 env[1347]: time="2024-02-12T19:39:16.833930925Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 19:39:16.833983 env[1347]: time="2024-02-12T19:39:16.833943362Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 19:39:16.834316 env[1347]: time="2024-02-12T19:39:16.834288679Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 19:39:16.834316 env[1347]: time="2024-02-12T19:39:16.834310994Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 19:39:16.834385 env[1347]: time="2024-02-12T19:39:16.834330949Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 19:39:16.834385 env[1347]: time="2024-02-12T19:39:16.834343746Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 19:39:16.834385 env[1347]: time="2024-02-12T19:39:16.834357862Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 19:39:16.834515 env[1347]: time="2024-02-12T19:39:16.834490471Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 19:39:16.834587 env[1347]: time="2024-02-12T19:39:16.834568692Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 19:39:16.840073 tar[1341]: ./bandwidth Feb 12 19:39:16.841933 env[1347]: time="2024-02-12T19:39:16.841891334Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 19:39:16.842051 env[1347]: time="2024-02-12T19:39:16.841949600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 19:39:16.842051 env[1347]: time="2024-02-12T19:39:16.841967476Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 19:39:16.842051 env[1347]: time="2024-02-12T19:39:16.842025542Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 19:39:16.842051 env[1347]: time="2024-02-12T19:39:16.842038979Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 19:39:16.842142 env[1347]: time="2024-02-12T19:39:16.842052775Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 19:39:16.842142 env[1347]: time="2024-02-12T19:39:16.842076850Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 19:39:16.842142 env[1347]: time="2024-02-12T19:39:16.842089566Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 19:39:16.842142 env[1347]: time="2024-02-12T19:39:16.842104603Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 19:39:16.842142 env[1347]: time="2024-02-12T19:39:16.842117040Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 19:39:16.842142 env[1347]: time="2024-02-12T19:39:16.842130397Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 19:39:16.842262 env[1347]: time="2024-02-12T19:39:16.842144753Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 19:39:16.842358 env[1347]: time="2024-02-12T19:39:16.842303595Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 19:39:16.842358 env[1347]: time="2024-02-12T19:39:16.842328389Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 19:39:16.842358 env[1347]: time="2024-02-12T19:39:16.842342066Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 19:39:16.842358 env[1347]: time="2024-02-12T19:39:16.842353943Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 19:39:16.842450 env[1347]: time="2024-02-12T19:39:16.842369299Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 19:39:16.842450 env[1347]: time="2024-02-12T19:39:16.842379977Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 19:39:16.842450 env[1347]: time="2024-02-12T19:39:16.842399692Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 19:39:16.842450 env[1347]: time="2024-02-12T19:39:16.842434524Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 19:39:16.842687 env[1347]: time="2024-02-12T19:39:16.842627317Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 19:39:16.842687 env[1347]: time="2024-02-12T19:39:16.842688143Z" level=info msg="Connect containerd service" Feb 12 19:39:16.857404 env[1347]: time="2024-02-12T19:39:16.842720015Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 19:39:16.857404 env[1347]: time="2024-02-12T19:39:16.843293757Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 19:39:16.857404 env[1347]: time="2024-02-12T19:39:16.843533660Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 19:39:16.857404 env[1347]: time="2024-02-12T19:39:16.843572850Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 19:39:16.857404 env[1347]: time="2024-02-12T19:39:16.843626597Z" level=info msg="containerd successfully booted in 0.108136s" Feb 12 19:39:16.843721 systemd[1]: Started containerd.service. Feb 12 19:39:16.858990 env[1347]: time="2024-02-12T19:39:16.858526541Z" level=info msg="Start subscribing containerd event" Feb 12 19:39:16.858990 env[1347]: time="2024-02-12T19:39:16.858619598Z" level=info msg="Start recovering state" Feb 12 19:39:16.858990 env[1347]: time="2024-02-12T19:39:16.858721294Z" level=info msg="Start event monitor" Feb 12 19:39:16.858990 env[1347]: time="2024-02-12T19:39:16.858754926Z" level=info msg="Start snapshots syncer" Feb 12 19:39:16.858990 env[1347]: time="2024-02-12T19:39:16.858784719Z" level=info msg="Start cni network conf syncer for default" Feb 12 19:39:16.858990 env[1347]: time="2024-02-12T19:39:16.858792237Z" level=info msg="Start streaming server" Feb 12 19:39:16.928396 bash[1373]: Updated "/home/core/.ssh/authorized_keys" Feb 12 19:39:16.929364 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 19:39:16.952861 systemd[1]: nvidia.service: Deactivated successfully. Feb 12 19:39:16.962090 tar[1341]: ./ptp Feb 12 19:39:16.964724 dbus-daemon[1322]: [system] SELinux support is enabled Feb 12 19:39:16.971076 dbus-daemon[1322]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 12 19:39:16.964894 systemd[1]: Started dbus.service. Feb 12 19:39:16.970552 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 19:39:16.970574 systemd[1]: Reached target system-config.target. Feb 12 19:39:16.977794 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 19:39:16.977816 systemd[1]: Reached target user-config.target. Feb 12 19:39:16.987077 systemd[1]: Started systemd-logind.service. Feb 12 19:39:17.044333 tar[1341]: ./vlan Feb 12 19:39:17.108145 tar[1341]: ./host-device Feb 12 19:39:17.164040 tar[1341]: ./tuning Feb 12 19:39:17.217123 tar[1341]: ./vrf Feb 12 19:39:17.268130 tar[1341]: ./sbr Feb 12 19:39:17.320684 tar[1341]: ./tap Feb 12 19:39:17.348327 systemd[1]: Finished prepare-critools.service. Feb 12 19:39:17.372728 tar[1341]: ./dhcp Feb 12 19:39:17.456425 tar[1341]: ./static Feb 12 19:39:17.481158 tar[1341]: ./firewall Feb 12 19:39:17.487201 update_engine[1336]: I0212 19:39:17.474478 1336 main.cc:92] Flatcar Update Engine starting Feb 12 19:39:17.518955 tar[1341]: ./macvlan Feb 12 19:39:17.553384 tar[1341]: ./dummy Feb 12 19:39:17.572898 systemd[1]: Started update-engine.service. Feb 12 19:39:17.580585 systemd[1]: Started locksmithd.service. Feb 12 19:39:17.585061 update_engine[1336]: I0212 19:39:17.579203 1336 update_check_scheduler.cc:74] Next update check in 5m27s Feb 12 19:39:17.599800 tar[1341]: ./bridge Feb 12 19:39:17.635533 tar[1341]: ./ipvlan Feb 12 19:39:17.668262 tar[1341]: ./portmap Feb 12 19:39:17.700009 tar[1341]: ./host-local Feb 12 19:39:17.777363 systemd[1]: Finished prepare-cni-plugins.service. Feb 12 19:39:19.041943 locksmithd[1426]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 19:39:19.233767 sshd_keygen[1338]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 19:39:19.250549 systemd[1]: Finished sshd-keygen.service. Feb 12 19:39:19.256251 systemd[1]: Starting issuegen.service... Feb 12 19:39:19.261168 systemd[1]: Started waagent.service. Feb 12 19:39:19.265635 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 19:39:19.265851 systemd[1]: Finished issuegen.service. Feb 12 19:39:19.272212 systemd[1]: Starting systemd-user-sessions.service... Feb 12 19:39:19.281302 systemd[1]: Finished systemd-user-sessions.service. Feb 12 19:39:19.288291 systemd[1]: Started getty@tty1.service. Feb 12 19:39:19.294170 systemd[1]: Started serial-getty@ttyAMA0.service. Feb 12 19:39:19.299149 systemd[1]: Reached target getty.target. Feb 12 19:39:19.303453 systemd[1]: Reached target multi-user.target. Feb 12 19:39:19.312017 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 19:39:19.320228 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 19:39:19.320403 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 19:39:19.326939 systemd[1]: Startup finished in 718ms (kernel) + 15.080s (initrd) + 23.328s (userspace) = 39.127s. Feb 12 19:39:19.814488 login[1446]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Feb 12 19:39:19.816995 login[1447]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 12 19:39:19.884667 systemd[1]: Created slice user-500.slice. Feb 12 19:39:19.885905 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 19:39:19.888609 systemd-logind[1334]: New session 2 of user core. Feb 12 19:39:19.923675 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 19:39:19.925197 systemd[1]: Starting user@500.service... Feb 12 19:39:19.939894 (systemd)[1450]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:39:20.125365 systemd[1450]: Queued start job for default target default.target. Feb 12 19:39:20.126251 systemd[1450]: Reached target paths.target. Feb 12 19:39:20.126277 systemd[1450]: Reached target sockets.target. Feb 12 19:39:20.126288 systemd[1450]: Reached target timers.target. Feb 12 19:39:20.126299 systemd[1450]: Reached target basic.target. Feb 12 19:39:20.126347 systemd[1450]: Reached target default.target. Feb 12 19:39:20.126370 systemd[1450]: Startup finished in 180ms. Feb 12 19:39:20.126421 systemd[1]: Started user@500.service. Feb 12 19:39:20.127381 systemd[1]: Started session-2.scope. Feb 12 19:39:20.814884 login[1446]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 12 19:39:20.819285 systemd[1]: Started session-1.scope. Feb 12 19:39:20.819694 systemd-logind[1334]: New session 1 of user core. Feb 12 19:39:25.888954 waagent[1443]: 2024-02-12T19:39:25.888844Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Feb 12 19:39:25.898581 waagent[1443]: 2024-02-12T19:39:25.898482Z INFO Daemon Daemon OS: flatcar 3510.3.2 Feb 12 19:39:25.904141 waagent[1443]: 2024-02-12T19:39:25.904052Z INFO Daemon Daemon Python: 3.9.16 Feb 12 19:39:25.909492 waagent[1443]: 2024-02-12T19:39:25.909403Z INFO Daemon Daemon Run daemon Feb 12 19:39:25.914584 waagent[1443]: 2024-02-12T19:39:25.914506Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.2' Feb 12 19:39:25.932307 waagent[1443]: 2024-02-12T19:39:25.932171Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 12 19:39:25.948901 waagent[1443]: 2024-02-12T19:39:25.948763Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 12 19:39:25.960009 waagent[1443]: 2024-02-12T19:39:25.959919Z INFO Daemon Daemon cloud-init is enabled: False Feb 12 19:39:25.965939 waagent[1443]: 2024-02-12T19:39:25.965852Z INFO Daemon Daemon Using waagent for provisioning Feb 12 19:39:25.972119 waagent[1443]: 2024-02-12T19:39:25.972044Z INFO Daemon Daemon Activate resource disk Feb 12 19:39:25.977274 waagent[1443]: 2024-02-12T19:39:25.977198Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Feb 12 19:39:25.992770 waagent[1443]: 2024-02-12T19:39:25.992669Z INFO Daemon Daemon Found device: None Feb 12 19:39:25.997912 waagent[1443]: 2024-02-12T19:39:25.997827Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Feb 12 19:39:26.006914 waagent[1443]: 2024-02-12T19:39:26.006823Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Feb 12 19:39:26.020090 waagent[1443]: 2024-02-12T19:39:26.020017Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 12 19:39:26.026696 waagent[1443]: 2024-02-12T19:39:26.026614Z INFO Daemon Daemon Running default provisioning handler Feb 12 19:39:26.040760 waagent[1443]: 2024-02-12T19:39:26.040614Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 12 19:39:26.056335 waagent[1443]: 2024-02-12T19:39:26.056202Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 12 19:39:26.068208 waagent[1443]: 2024-02-12T19:39:26.068117Z INFO Daemon Daemon cloud-init is enabled: False Feb 12 19:39:26.073995 waagent[1443]: 2024-02-12T19:39:26.073909Z INFO Daemon Daemon Copying ovf-env.xml Feb 12 19:39:26.097166 waagent[1443]: 2024-02-12T19:39:26.097028Z INFO Daemon Daemon Successfully mounted dvd Feb 12 19:39:26.241464 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Feb 12 19:39:26.262764 waagent[1443]: 2024-02-12T19:39:26.262530Z INFO Daemon Daemon Detect protocol endpoint Feb 12 19:39:26.268588 waagent[1443]: 2024-02-12T19:39:26.268499Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 12 19:39:26.275093 waagent[1443]: 2024-02-12T19:39:26.274982Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Feb 12 19:39:26.281698 waagent[1443]: 2024-02-12T19:39:26.281624Z INFO Daemon Daemon Test for route to 168.63.129.16 Feb 12 19:39:26.287370 waagent[1443]: 2024-02-12T19:39:26.287268Z INFO Daemon Daemon Route to 168.63.129.16 exists Feb 12 19:39:26.293111 waagent[1443]: 2024-02-12T19:39:26.293038Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Feb 12 19:39:26.393129 waagent[1443]: 2024-02-12T19:39:26.393063Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Feb 12 19:39:26.401242 waagent[1443]: 2024-02-12T19:39:26.401193Z INFO Daemon Daemon Wire protocol version:2012-11-30 Feb 12 19:39:26.407634 waagent[1443]: 2024-02-12T19:39:26.407523Z INFO Daemon Daemon Server preferred version:2015-04-05 Feb 12 19:39:27.150296 waagent[1443]: 2024-02-12T19:39:27.150144Z INFO Daemon Daemon Initializing goal state during protocol detection Feb 12 19:39:27.169207 waagent[1443]: 2024-02-12T19:39:27.169126Z INFO Daemon Daemon Forcing an update of the goal state.. Feb 12 19:39:27.175402 waagent[1443]: 2024-02-12T19:39:27.175325Z INFO Daemon Daemon Fetching goal state [incarnation 1] Feb 12 19:39:27.265219 waagent[1443]: 2024-02-12T19:39:27.265086Z INFO Daemon Daemon Found private key matching thumbprint 6B71D2F74ABFB2B92D535014ACF8A480830A65DD Feb 12 19:39:27.275186 waagent[1443]: 2024-02-12T19:39:27.275084Z INFO Daemon Daemon Certificate with thumbprint 8D51F84750E2DDA280F7CA853ACC4D34E6A78446 has no matching private key. Feb 12 19:39:27.285878 waagent[1443]: 2024-02-12T19:39:27.285785Z INFO Daemon Daemon Fetch goal state completed Feb 12 19:39:27.342175 waagent[1443]: 2024-02-12T19:39:27.342084Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: fdb1e4b1-b505-4d66-850a-4305a574406c New eTag: 8724835085136436875] Feb 12 19:39:27.353412 waagent[1443]: 2024-02-12T19:39:27.353298Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Feb 12 19:39:27.370154 waagent[1443]: 2024-02-12T19:39:27.370069Z INFO Daemon Daemon Starting provisioning Feb 12 19:39:27.375927 waagent[1443]: 2024-02-12T19:39:27.375840Z INFO Daemon Daemon Handle ovf-env.xml. Feb 12 19:39:27.380892 waagent[1443]: 2024-02-12T19:39:27.380815Z INFO Daemon Daemon Set hostname [ci-3510.3.2-a-b351613fb4] Feb 12 19:39:27.422810 waagent[1443]: 2024-02-12T19:39:27.422660Z INFO Daemon Daemon Publish hostname [ci-3510.3.2-a-b351613fb4] Feb 12 19:39:27.429862 waagent[1443]: 2024-02-12T19:39:27.429769Z INFO Daemon Daemon Examine /proc/net/route for primary interface Feb 12 19:39:27.437070 waagent[1443]: 2024-02-12T19:39:27.436988Z INFO Daemon Daemon Primary interface is [eth0] Feb 12 19:39:27.454616 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Feb 12 19:39:27.454789 systemd[1]: Stopped systemd-networkd-wait-online.service. Feb 12 19:39:27.454844 systemd[1]: Stopping systemd-networkd-wait-online.service... Feb 12 19:39:27.455072 systemd[1]: Stopping systemd-networkd.service... Feb 12 19:39:27.459798 systemd-networkd[1218]: eth0: DHCPv6 lease lost Feb 12 19:39:27.461622 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 19:39:27.461812 systemd[1]: Stopped systemd-networkd.service. Feb 12 19:39:27.463766 systemd[1]: Starting systemd-networkd.service... Feb 12 19:39:27.492031 systemd-networkd[1496]: enP30795s1: Link UP Feb 12 19:39:27.492042 systemd-networkd[1496]: enP30795s1: Gained carrier Feb 12 19:39:27.493077 systemd-networkd[1496]: eth0: Link UP Feb 12 19:39:27.493087 systemd-networkd[1496]: eth0: Gained carrier Feb 12 19:39:27.493392 systemd-networkd[1496]: lo: Link UP Feb 12 19:39:27.493402 systemd-networkd[1496]: lo: Gained carrier Feb 12 19:39:27.493623 systemd-networkd[1496]: eth0: Gained IPv6LL Feb 12 19:39:27.493982 systemd-networkd[1496]: Enumeration completed Feb 12 19:39:27.494090 systemd[1]: Started systemd-networkd.service. Feb 12 19:39:27.495348 systemd-networkd[1496]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:39:27.495767 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 19:39:27.497235 waagent[1443]: 2024-02-12T19:39:27.496928Z INFO Daemon Daemon Create user account if not exists Feb 12 19:39:27.504143 waagent[1443]: 2024-02-12T19:39:27.504053Z INFO Daemon Daemon User core already exists, skip useradd Feb 12 19:39:27.510282 waagent[1443]: 2024-02-12T19:39:27.510194Z INFO Daemon Daemon Configure sudoer Feb 12 19:39:27.517238 waagent[1443]: 2024-02-12T19:39:27.517138Z INFO Daemon Daemon Configure sshd Feb 12 19:39:27.521682 waagent[1443]: 2024-02-12T19:39:27.521596Z INFO Daemon Daemon Deploy ssh public key. Feb 12 19:39:27.531847 systemd-networkd[1496]: eth0: DHCPv4 address 10.200.20.12/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 12 19:39:27.534981 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 19:39:27.580125 waagent[1443]: 2024-02-12T19:39:27.579972Z INFO Daemon Daemon Decode custom data Feb 12 19:39:27.585138 waagent[1443]: 2024-02-12T19:39:27.585051Z INFO Daemon Daemon Save custom data Feb 12 19:39:28.769667 waagent[1443]: 2024-02-12T19:39:28.769595Z INFO Daemon Daemon Provisioning complete Feb 12 19:39:28.788576 waagent[1443]: 2024-02-12T19:39:28.788508Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Feb 12 19:39:28.794922 waagent[1443]: 2024-02-12T19:39:28.794838Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Feb 12 19:39:28.805745 waagent[1443]: 2024-02-12T19:39:28.805661Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Feb 12 19:39:29.110973 waagent[1505]: 2024-02-12T19:39:29.110876Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Feb 12 19:39:29.112096 waagent[1505]: 2024-02-12T19:39:29.112036Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:39:29.112350 waagent[1505]: 2024-02-12T19:39:29.112302Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:39:29.125376 waagent[1505]: 2024-02-12T19:39:29.125287Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Feb 12 19:39:29.125715 waagent[1505]: 2024-02-12T19:39:29.125667Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Feb 12 19:39:29.195696 waagent[1505]: 2024-02-12T19:39:29.195563Z INFO ExtHandler ExtHandler Found private key matching thumbprint 6B71D2F74ABFB2B92D535014ACF8A480830A65DD Feb 12 19:39:29.196100 waagent[1505]: 2024-02-12T19:39:29.196041Z INFO ExtHandler ExtHandler Certificate with thumbprint 8D51F84750E2DDA280F7CA853ACC4D34E6A78446 has no matching private key. Feb 12 19:39:29.196428 waagent[1505]: 2024-02-12T19:39:29.196377Z INFO ExtHandler ExtHandler Fetch goal state completed Feb 12 19:39:29.225728 waagent[1505]: 2024-02-12T19:39:29.225671Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: c6deebcc-9955-4e88-90a0-9d0f8a6424c8 New eTag: 8724835085136436875] Feb 12 19:39:29.226561 waagent[1505]: 2024-02-12T19:39:29.226503Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Feb 12 19:39:29.285460 waagent[1505]: 2024-02-12T19:39:29.285329Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 12 19:39:29.396985 waagent[1505]: 2024-02-12T19:39:29.396849Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1505 Feb 12 19:39:29.400935 waagent[1505]: 2024-02-12T19:39:29.400863Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 12 19:39:29.402475 waagent[1505]: 2024-02-12T19:39:29.402414Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 12 19:39:29.566611 waagent[1505]: 2024-02-12T19:39:29.566552Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 12 19:39:29.567198 waagent[1505]: 2024-02-12T19:39:29.567142Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 12 19:39:29.575269 waagent[1505]: 2024-02-12T19:39:29.575215Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 12 19:39:29.575926 waagent[1505]: 2024-02-12T19:39:29.575871Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 12 19:39:29.577217 waagent[1505]: 2024-02-12T19:39:29.577151Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Feb 12 19:39:29.578710 waagent[1505]: 2024-02-12T19:39:29.578643Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 12 19:39:29.579039 waagent[1505]: 2024-02-12T19:39:29.578970Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:39:29.579626 waagent[1505]: 2024-02-12T19:39:29.579555Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:39:29.580264 waagent[1505]: 2024-02-12T19:39:29.580199Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 12 19:39:29.580595 waagent[1505]: 2024-02-12T19:39:29.580536Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 12 19:39:29.580595 waagent[1505]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 12 19:39:29.580595 waagent[1505]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Feb 12 19:39:29.580595 waagent[1505]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 12 19:39:29.580595 waagent[1505]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:39:29.580595 waagent[1505]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:39:29.580595 waagent[1505]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:39:29.582827 waagent[1505]: 2024-02-12T19:39:29.582644Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 12 19:39:29.583620 waagent[1505]: 2024-02-12T19:39:29.583550Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:39:29.583835 waagent[1505]: 2024-02-12T19:39:29.583776Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:39:29.584402 waagent[1505]: 2024-02-12T19:39:29.584336Z INFO EnvHandler ExtHandler Configure routes Feb 12 19:39:29.584551 waagent[1505]: 2024-02-12T19:39:29.584504Z INFO EnvHandler ExtHandler Gateway:None Feb 12 19:39:29.584668 waagent[1505]: 2024-02-12T19:39:29.584626Z INFO EnvHandler ExtHandler Routes:None Feb 12 19:39:29.585542 waagent[1505]: 2024-02-12T19:39:29.585484Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 12 19:39:29.585693 waagent[1505]: 2024-02-12T19:39:29.585626Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 12 19:39:29.586447 waagent[1505]: 2024-02-12T19:39:29.586358Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 12 19:39:29.586633 waagent[1505]: 2024-02-12T19:39:29.586562Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 12 19:39:29.586954 waagent[1505]: 2024-02-12T19:39:29.586886Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 12 19:39:29.597943 waagent[1505]: 2024-02-12T19:39:29.597870Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Feb 12 19:39:29.599422 waagent[1505]: 2024-02-12T19:39:29.599375Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 12 19:39:29.600441 waagent[1505]: 2024-02-12T19:39:29.600388Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Feb 12 19:39:29.640319 waagent[1505]: 2024-02-12T19:39:29.640227Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1496' Feb 12 19:39:29.643343 waagent[1505]: 2024-02-12T19:39:29.643271Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Feb 12 19:39:29.748383 waagent[1505]: 2024-02-12T19:39:29.748189Z INFO MonitorHandler ExtHandler Network interfaces: Feb 12 19:39:29.748383 waagent[1505]: Executing ['ip', '-a', '-o', 'link']: Feb 12 19:39:29.748383 waagent[1505]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 12 19:39:29.748383 waagent[1505]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:c4:cb:b2 brd ff:ff:ff:ff:ff:ff Feb 12 19:39:29.748383 waagent[1505]: 3: enP30795s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:c4:cb:b2 brd ff:ff:ff:ff:ff:ff\ altname enP30795p0s2 Feb 12 19:39:29.748383 waagent[1505]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 12 19:39:29.748383 waagent[1505]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 12 19:39:29.748383 waagent[1505]: 2: eth0 inet 10.200.20.12/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 12 19:39:29.748383 waagent[1505]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 12 19:39:29.748383 waagent[1505]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 12 19:39:29.748383 waagent[1505]: 2: eth0 inet6 fe80::20d:3aff:fec4:cbb2/64 scope link \ valid_lft forever preferred_lft forever Feb 12 19:39:29.790244 waagent[1505]: 2024-02-12T19:39:29.790171Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.9.1.1 -- exiting Feb 12 19:39:30.810102 waagent[1443]: 2024-02-12T19:39:30.809978Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Feb 12 19:39:30.813717 waagent[1443]: 2024-02-12T19:39:30.813665Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.9.1.1 to be the latest agent Feb 12 19:39:31.979814 waagent[1536]: 2024-02-12T19:39:31.979701Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.9.1.1) Feb 12 19:39:31.980860 waagent[1536]: 2024-02-12T19:39:31.980802Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.2 Feb 12 19:39:31.981093 waagent[1536]: 2024-02-12T19:39:31.981045Z INFO ExtHandler ExtHandler Python: 3.9.16 Feb 12 19:39:31.989091 waagent[1536]: 2024-02-12T19:39:31.988952Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 12 19:39:31.989678 waagent[1536]: 2024-02-12T19:39:31.989621Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:39:31.989963 waagent[1536]: 2024-02-12T19:39:31.989912Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:39:32.003254 waagent[1536]: 2024-02-12T19:39:32.003168Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Feb 12 19:39:32.017163 waagent[1536]: 2024-02-12T19:39:32.017100Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143 Feb 12 19:39:32.018430 waagent[1536]: 2024-02-12T19:39:32.018372Z INFO ExtHandler Feb 12 19:39:32.018681 waagent[1536]: 2024-02-12T19:39:32.018630Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 0dbfe893-688c-4f1b-b65c-e9e237a64372 eTag: 8724835085136436875 source: Fabric] Feb 12 19:39:32.019514 waagent[1536]: 2024-02-12T19:39:32.019460Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Feb 12 19:39:32.020850 waagent[1536]: 2024-02-12T19:39:32.020790Z INFO ExtHandler Feb 12 19:39:32.021080 waagent[1536]: 2024-02-12T19:39:32.021031Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Feb 12 19:39:32.028018 waagent[1536]: 2024-02-12T19:39:32.027967Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Feb 12 19:39:32.028651 waagent[1536]: 2024-02-12T19:39:32.028606Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 12 19:39:32.049539 waagent[1536]: 2024-02-12T19:39:32.049478Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Feb 12 19:39:32.121849 waagent[1536]: 2024-02-12T19:39:32.121675Z INFO ExtHandler Downloaded certificate {'thumbprint': '8D51F84750E2DDA280F7CA853ACC4D34E6A78446', 'hasPrivateKey': False} Feb 12 19:39:32.123042 waagent[1536]: 2024-02-12T19:39:32.122984Z INFO ExtHandler Downloaded certificate {'thumbprint': '6B71D2F74ABFB2B92D535014ACF8A480830A65DD', 'hasPrivateKey': True} Feb 12 19:39:32.124247 waagent[1536]: 2024-02-12T19:39:32.124187Z INFO ExtHandler Fetch goal state completed Feb 12 19:39:32.146908 waagent[1536]: 2024-02-12T19:39:32.146832Z INFO ExtHandler ExtHandler WALinuxAgent-2.9.1.1 running as process 1536 Feb 12 19:39:32.150558 waagent[1536]: 2024-02-12T19:39:32.150486Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 12 19:39:32.152239 waagent[1536]: 2024-02-12T19:39:32.152171Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 12 19:39:32.157138 waagent[1536]: 2024-02-12T19:39:32.157083Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 12 19:39:32.157653 waagent[1536]: 2024-02-12T19:39:32.157596Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 12 19:39:32.165481 waagent[1536]: 2024-02-12T19:39:32.165423Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 12 19:39:32.166185 waagent[1536]: 2024-02-12T19:39:32.166129Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 12 19:39:32.172316 waagent[1536]: 2024-02-12T19:39:32.172201Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Feb 12 19:39:32.179782 waagent[1536]: 2024-02-12T19:39:32.179703Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Feb 12 19:39:32.181514 waagent[1536]: 2024-02-12T19:39:32.181446Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 12 19:39:32.181811 waagent[1536]: 2024-02-12T19:39:32.181720Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:39:32.182329 waagent[1536]: 2024-02-12T19:39:32.182264Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:39:32.183245 waagent[1536]: 2024-02-12T19:39:32.183171Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 12 19:39:32.183578 waagent[1536]: 2024-02-12T19:39:32.183515Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 12 19:39:32.183578 waagent[1536]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 12 19:39:32.183578 waagent[1536]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Feb 12 19:39:32.183578 waagent[1536]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 12 19:39:32.183578 waagent[1536]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:39:32.183578 waagent[1536]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:39:32.183578 waagent[1536]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:39:32.185894 waagent[1536]: 2024-02-12T19:39:32.185770Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 12 19:39:32.186353 waagent[1536]: 2024-02-12T19:39:32.186280Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:39:32.187020 waagent[1536]: 2024-02-12T19:39:32.186889Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:39:32.189682 waagent[1536]: 2024-02-12T19:39:32.189521Z INFO EnvHandler ExtHandler Configure routes Feb 12 19:39:32.190015 waagent[1536]: 2024-02-12T19:39:32.189946Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 12 19:39:32.190230 waagent[1536]: 2024-02-12T19:39:32.190161Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 12 19:39:32.190954 waagent[1536]: 2024-02-12T19:39:32.190876Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 12 19:39:32.191430 waagent[1536]: 2024-02-12T19:39:32.191362Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 12 19:39:32.193328 waagent[1536]: 2024-02-12T19:39:32.193041Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 12 19:39:32.193636 waagent[1536]: 2024-02-12T19:39:32.193568Z INFO EnvHandler ExtHandler Gateway:None Feb 12 19:39:32.199346 waagent[1536]: 2024-02-12T19:39:32.199265Z INFO EnvHandler ExtHandler Routes:None Feb 12 19:39:32.204871 waagent[1536]: 2024-02-12T19:39:32.204791Z INFO MonitorHandler ExtHandler Network interfaces: Feb 12 19:39:32.204871 waagent[1536]: Executing ['ip', '-a', '-o', 'link']: Feb 12 19:39:32.204871 waagent[1536]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 12 19:39:32.204871 waagent[1536]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:c4:cb:b2 brd ff:ff:ff:ff:ff:ff Feb 12 19:39:32.204871 waagent[1536]: 3: enP30795s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:c4:cb:b2 brd ff:ff:ff:ff:ff:ff\ altname enP30795p0s2 Feb 12 19:39:32.204871 waagent[1536]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 12 19:39:32.204871 waagent[1536]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 12 19:39:32.204871 waagent[1536]: 2: eth0 inet 10.200.20.12/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 12 19:39:32.204871 waagent[1536]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 12 19:39:32.204871 waagent[1536]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 12 19:39:32.204871 waagent[1536]: 2: eth0 inet6 fe80::20d:3aff:fec4:cbb2/64 scope link \ valid_lft forever preferred_lft forever Feb 12 19:39:32.211200 waagent[1536]: 2024-02-12T19:39:32.211101Z INFO ExtHandler ExtHandler No requested version specified, checking for all versions for agent update (family: Prod) Feb 12 19:39:32.212439 waagent[1536]: 2024-02-12T19:39:32.212346Z INFO ExtHandler ExtHandler Downloading manifest Feb 12 19:39:32.259291 waagent[1536]: 2024-02-12T19:39:32.259160Z INFO ExtHandler ExtHandler Feb 12 19:39:32.259445 waagent[1536]: 2024-02-12T19:39:32.259378Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: ab5fdf1a-2a1b-49d4-8e1f-f001b8cb35e0 correlation 250b84ea-af49-4afc-9168-464286561bf3 created: 2024-02-12T19:38:00.528397Z] Feb 12 19:39:32.260904 waagent[1536]: 2024-02-12T19:39:32.260829Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Feb 12 19:39:32.265243 waagent[1536]: 2024-02-12T19:39:32.265099Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 5 ms] Feb 12 19:39:32.295001 waagent[1536]: 2024-02-12T19:39:32.294883Z INFO ExtHandler ExtHandler Looking for existing remote access users. Feb 12 19:39:32.311346 waagent[1536]: 2024-02-12T19:39:32.311268Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.9.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 911F44F5-2DA4-46EA-82F4-349B91DC37FC;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Feb 12 19:39:32.472786 waagent[1536]: 2024-02-12T19:39:32.472628Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules. Current Firewall rules: Feb 12 19:39:32.472786 waagent[1536]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:39:32.472786 waagent[1536]: pkts bytes target prot opt in out source destination Feb 12 19:39:32.472786 waagent[1536]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:39:32.472786 waagent[1536]: pkts bytes target prot opt in out source destination Feb 12 19:39:32.472786 waagent[1536]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:39:32.472786 waagent[1536]: pkts bytes target prot opt in out source destination Feb 12 19:39:32.472786 waagent[1536]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 12 19:39:32.472786 waagent[1536]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 12 19:39:32.472786 waagent[1536]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 12 19:39:32.480468 waagent[1536]: 2024-02-12T19:39:32.480319Z INFO EnvHandler ExtHandler Current Firewall rules: Feb 12 19:39:32.480468 waagent[1536]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:39:32.480468 waagent[1536]: pkts bytes target prot opt in out source destination Feb 12 19:39:32.480468 waagent[1536]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:39:32.480468 waagent[1536]: pkts bytes target prot opt in out source destination Feb 12 19:39:32.480468 waagent[1536]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:39:32.480468 waagent[1536]: pkts bytes target prot opt in out source destination Feb 12 19:39:32.480468 waagent[1536]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 12 19:39:32.480468 waagent[1536]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 12 19:39:32.480468 waagent[1536]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 12 19:39:32.481080 waagent[1536]: 2024-02-12T19:39:32.481024Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Feb 12 19:39:55.410837 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Feb 12 19:40:03.236013 update_engine[1336]: I0212 19:40:03.235965 1336 update_attempter.cc:509] Updating boot flags... Feb 12 19:40:07.295962 systemd[1]: Created slice system-sshd.slice. Feb 12 19:40:07.297059 systemd[1]: Started sshd@0-10.200.20.12:22-10.200.12.6:51106.service. Feb 12 19:40:07.933001 sshd[1623]: Accepted publickey for core from 10.200.12.6 port 51106 ssh2: RSA SHA256:/GC//G+FwBgDRBLcr4tZBksqHch3CtpA6Spv2+8GrTw Feb 12 19:40:07.947292 sshd[1623]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:40:07.951803 systemd[1]: Started session-3.scope. Feb 12 19:40:07.952794 systemd-logind[1334]: New session 3 of user core. Feb 12 19:40:08.300658 systemd[1]: Started sshd@1-10.200.20.12:22-10.200.12.6:51110.service. Feb 12 19:40:08.715082 sshd[1631]: Accepted publickey for core from 10.200.12.6 port 51110 ssh2: RSA SHA256:/GC//G+FwBgDRBLcr4tZBksqHch3CtpA6Spv2+8GrTw Feb 12 19:40:08.716314 sshd[1631]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:40:08.720352 systemd[1]: Started session-4.scope. Feb 12 19:40:08.720643 systemd-logind[1334]: New session 4 of user core. Feb 12 19:40:09.016994 sshd[1631]: pam_unix(sshd:session): session closed for user core Feb 12 19:40:09.019438 systemd[1]: sshd@1-10.200.20.12:22-10.200.12.6:51110.service: Deactivated successfully. Feb 12 19:40:09.020153 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 19:40:09.020672 systemd-logind[1334]: Session 4 logged out. Waiting for processes to exit. Feb 12 19:40:09.021613 systemd-logind[1334]: Removed session 4. Feb 12 19:40:09.095933 systemd[1]: Started sshd@2-10.200.20.12:22-10.200.12.6:51122.service. Feb 12 19:40:09.509377 sshd[1637]: Accepted publickey for core from 10.200.12.6 port 51122 ssh2: RSA SHA256:/GC//G+FwBgDRBLcr4tZBksqHch3CtpA6Spv2+8GrTw Feb 12 19:40:09.510600 sshd[1637]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:40:09.514222 systemd-logind[1334]: New session 5 of user core. Feb 12 19:40:09.514619 systemd[1]: Started session-5.scope. Feb 12 19:40:09.808277 sshd[1637]: pam_unix(sshd:session): session closed for user core Feb 12 19:40:09.810763 systemd[1]: sshd@2-10.200.20.12:22-10.200.12.6:51122.service: Deactivated successfully. Feb 12 19:40:09.811447 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 19:40:09.811982 systemd-logind[1334]: Session 5 logged out. Waiting for processes to exit. Feb 12 19:40:09.812782 systemd-logind[1334]: Removed session 5. Feb 12 19:40:09.877459 systemd[1]: Started sshd@3-10.200.20.12:22-10.200.12.6:51134.service. Feb 12 19:40:10.291265 sshd[1643]: Accepted publickey for core from 10.200.12.6 port 51134 ssh2: RSA SHA256:/GC//G+FwBgDRBLcr4tZBksqHch3CtpA6Spv2+8GrTw Feb 12 19:40:10.292488 sshd[1643]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:40:10.296168 systemd-logind[1334]: New session 6 of user core. Feb 12 19:40:10.296549 systemd[1]: Started session-6.scope. Feb 12 19:40:10.594145 sshd[1643]: pam_unix(sshd:session): session closed for user core Feb 12 19:40:10.596340 systemd[1]: sshd@3-10.200.20.12:22-10.200.12.6:51134.service: Deactivated successfully. Feb 12 19:40:10.597021 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 19:40:10.597541 systemd-logind[1334]: Session 6 logged out. Waiting for processes to exit. Feb 12 19:40:10.598313 systemd-logind[1334]: Removed session 6. Feb 12 19:40:10.668259 systemd[1]: Started sshd@4-10.200.20.12:22-10.200.12.6:51148.service. Feb 12 19:40:11.081556 sshd[1649]: Accepted publickey for core from 10.200.12.6 port 51148 ssh2: RSA SHA256:/GC//G+FwBgDRBLcr4tZBksqHch3CtpA6Spv2+8GrTw Feb 12 19:40:11.083059 sshd[1649]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:40:11.086570 systemd-logind[1334]: New session 7 of user core. Feb 12 19:40:11.087012 systemd[1]: Started session-7.scope. Feb 12 19:40:11.635267 sudo[1652]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 19:40:11.635454 sudo[1652]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:40:11.702878 dbus-daemon[1322]: avc: received setenforce notice (enforcing=1) Feb 12 19:40:11.703853 sudo[1652]: pam_unix(sudo:session): session closed for user root Feb 12 19:40:11.799038 sshd[1649]: pam_unix(sshd:session): session closed for user core Feb 12 19:40:11.802186 systemd[1]: sshd@4-10.200.20.12:22-10.200.12.6:51148.service: Deactivated successfully. Feb 12 19:40:11.802616 systemd-logind[1334]: Session 7 logged out. Waiting for processes to exit. Feb 12 19:40:11.803003 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 19:40:11.803842 systemd-logind[1334]: Removed session 7. Feb 12 19:40:11.870758 systemd[1]: Started sshd@5-10.200.20.12:22-10.200.12.6:51162.service. Feb 12 19:40:12.282649 sshd[1656]: Accepted publickey for core from 10.200.12.6 port 51162 ssh2: RSA SHA256:/GC//G+FwBgDRBLcr4tZBksqHch3CtpA6Spv2+8GrTw Feb 12 19:40:12.283980 sshd[1656]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:40:12.287642 systemd-logind[1334]: New session 8 of user core. Feb 12 19:40:12.288098 systemd[1]: Started session-8.scope. Feb 12 19:40:12.519496 sudo[1660]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 19:40:12.519689 sudo[1660]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:40:12.522191 sudo[1660]: pam_unix(sudo:session): session closed for user root Feb 12 19:40:12.526465 sudo[1659]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 19:40:12.526969 sudo[1659]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:40:12.535252 systemd[1]: Stopping audit-rules.service... Feb 12 19:40:12.540744 kernel: kauditd_printk_skb: 93 callbacks suppressed Feb 12 19:40:12.540867 kernel: audit: type=1305 audit(1707766812.535:173): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:40:12.535000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:40:12.541350 auditctl[1663]: No rules Feb 12 19:40:12.541842 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 19:40:12.542029 systemd[1]: Stopped audit-rules.service. Feb 12 19:40:12.543585 systemd[1]: Starting audit-rules.service... Feb 12 19:40:12.535000 audit[1663]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffe0e1b90 a2=420 a3=0 items=0 ppid=1 pid=1663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:12.576965 kernel: audit: type=1300 audit(1707766812.535:173): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffe0e1b90 a2=420 a3=0 items=0 ppid=1 pid=1663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:12.577099 kernel: audit: type=1327 audit(1707766812.535:173): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:40:12.535000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:40:12.540000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:12.587694 augenrules[1680]: No rules Feb 12 19:40:12.588764 systemd[1]: Finished audit-rules.service. Feb 12 19:40:12.598515 kernel: audit: type=1131 audit(1707766812.540:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:12.598702 sudo[1659]: pam_unix(sudo:session): session closed for user root Feb 12 19:40:12.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:12.619216 kernel: audit: type=1130 audit(1707766812.586:175): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:12.619282 kernel: audit: type=1106 audit(1707766812.598:176): pid=1659 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:40:12.598000 audit[1659]: USER_END pid=1659 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:40:12.598000 audit[1659]: CRED_DISP pid=1659 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:40:12.654846 kernel: audit: type=1104 audit(1707766812.598:177): pid=1659 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:40:12.663676 sshd[1656]: pam_unix(sshd:session): session closed for user core Feb 12 19:40:12.664000 audit[1656]: USER_END pid=1656 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:12.688371 systemd-logind[1334]: Session 8 logged out. Waiting for processes to exit. Feb 12 19:40:12.688596 systemd[1]: sshd@5-10.200.20.12:22-10.200.12.6:51162.service: Deactivated successfully. Feb 12 19:40:12.689292 systemd[1]: session-8.scope: Deactivated successfully. Feb 12 19:40:12.664000 audit[1656]: CRED_DISP pid=1656 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:12.707905 kernel: audit: type=1106 audit(1707766812.664:178): pid=1656 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:12.707977 kernel: audit: type=1104 audit(1707766812.664:179): pid=1656 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:12.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.12:22-10.200.12.6:51162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:12.708589 systemd-logind[1334]: Removed session 8. Feb 12 19:40:12.727763 kernel: audit: type=1131 audit(1707766812.688:180): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.12:22-10.200.12.6:51162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:12.732587 systemd[1]: Started sshd@6-10.200.20.12:22-10.200.12.6:51174.service. Feb 12 19:40:12.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.12:22-10.200.12.6:51174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:13.148000 audit[1686]: USER_ACCT pid=1686 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:13.149616 sshd[1686]: Accepted publickey for core from 10.200.12.6 port 51174 ssh2: RSA SHA256:/GC//G+FwBgDRBLcr4tZBksqHch3CtpA6Spv2+8GrTw Feb 12 19:40:13.150000 audit[1686]: CRED_ACQ pid=1686 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:13.150000 audit[1686]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc8123a50 a2=3 a3=1 items=0 ppid=1 pid=1686 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:13.150000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:40:13.151122 sshd[1686]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:40:13.154669 systemd-logind[1334]: New session 9 of user core. Feb 12 19:40:13.155081 systemd[1]: Started session-9.scope. Feb 12 19:40:13.158000 audit[1686]: USER_START pid=1686 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:13.159000 audit[1688]: CRED_ACQ pid=1688 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:13.388000 audit[1689]: USER_ACCT pid=1689 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:40:13.388000 audit[1689]: CRED_REFR pid=1689 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:40:13.389528 sudo[1689]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 12 19:40:13.389721 sudo[1689]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:40:13.390000 audit[1689]: USER_START pid=1689 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:40:14.168833 systemd[1]: Reloading. Feb 12 19:40:14.235792 /usr/lib/systemd/system-generators/torcx-generator[1719]: time="2024-02-12T19:40:14Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:40:14.236135 /usr/lib/systemd/system-generators/torcx-generator[1719]: time="2024-02-12T19:40:14Z" level=info msg="torcx already run" Feb 12 19:40:14.306577 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:40:14.306595 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:40:14.323453 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:40:14.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.386000 audit: BPF prog-id=35 op=LOAD Feb 12 19:40:14.386000 audit: BPF prog-id=34 op=UNLOAD Feb 12 19:40:14.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.387000 audit: BPF prog-id=36 op=LOAD Feb 12 19:40:14.387000 audit: BPF prog-id=18 op=UNLOAD Feb 12 19:40:14.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.387000 audit: BPF prog-id=37 op=LOAD Feb 12 19:40:14.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.387000 audit: BPF prog-id=38 op=LOAD Feb 12 19:40:14.387000 audit: BPF prog-id=19 op=UNLOAD Feb 12 19:40:14.387000 audit: BPF prog-id=20 op=UNLOAD Feb 12 19:40:14.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.389000 audit: BPF prog-id=39 op=LOAD Feb 12 19:40:14.389000 audit: BPF prog-id=32 op=UNLOAD Feb 12 19:40:14.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.389000 audit: BPF prog-id=40 op=LOAD Feb 12 19:40:14.389000 audit: BPF prog-id=27 op=UNLOAD Feb 12 19:40:14.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.390000 audit: BPF prog-id=41 op=LOAD Feb 12 19:40:14.391000 audit: BPF prog-id=24 op=UNLOAD Feb 12 19:40:14.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.391000 audit: BPF prog-id=42 op=LOAD Feb 12 19:40:14.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.391000 audit: BPF prog-id=43 op=LOAD Feb 12 19:40:14.391000 audit: BPF prog-id=25 op=UNLOAD Feb 12 19:40:14.391000 audit: BPF prog-id=26 op=UNLOAD Feb 12 19:40:14.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.391000 audit: BPF prog-id=44 op=LOAD Feb 12 19:40:14.391000 audit: BPF prog-id=28 op=UNLOAD Feb 12 19:40:14.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.392000 audit: BPF prog-id=45 op=LOAD Feb 12 19:40:14.392000 audit: BPF prog-id=29 op=UNLOAD Feb 12 19:40:14.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.392000 audit: BPF prog-id=46 op=LOAD Feb 12 19:40:14.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.392000 audit: BPF prog-id=47 op=LOAD Feb 12 19:40:14.392000 audit: BPF prog-id=30 op=UNLOAD Feb 12 19:40:14.393000 audit: BPF prog-id=31 op=UNLOAD Feb 12 19:40:14.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.393000 audit: BPF prog-id=48 op=LOAD Feb 12 19:40:14.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:14.393000 audit: BPF prog-id=49 op=LOAD Feb 12 19:40:14.393000 audit: BPF prog-id=21 op=UNLOAD Feb 12 19:40:14.393000 audit: BPF prog-id=22 op=UNLOAD Feb 12 19:40:14.409761 systemd[1]: Started kubelet.service. Feb 12 19:40:14.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:14.420693 systemd[1]: Starting coreos-metadata.service... Feb 12 19:40:14.461418 coreos-metadata[1784]: Feb 12 19:40:14.461 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Feb 12 19:40:14.464313 coreos-metadata[1784]: Feb 12 19:40:14.464 INFO Fetch successful Feb 12 19:40:14.464465 coreos-metadata[1784]: Feb 12 19:40:14.464 INFO Fetching http://168.63.129.16/machine/?comp=goalstate: Attempt #1 Feb 12 19:40:14.465940 coreos-metadata[1784]: Feb 12 19:40:14.465 INFO Fetch successful Feb 12 19:40:14.466264 coreos-metadata[1784]: Feb 12 19:40:14.466 INFO Fetching http://168.63.129.16/machine/c5d909ee-ad58-43fc-9ade-6a5b18bb90fb/e7c89e34%2D57ce%2D4fd3%2D972e%2Dc5156f057004.%5Fci%2D3510.3.2%2Da%2Db351613fb4?comp=config&type=sharedConfig&incarnation=1: Attempt #1 Feb 12 19:40:14.467861 coreos-metadata[1784]: Feb 12 19:40:14.467 INFO Fetch successful Feb 12 19:40:14.478048 kubelet[1777]: E0212 19:40:14.477992 1777 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 12 19:40:14.480080 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:40:14.480218 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:40:14.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:40:14.504926 coreos-metadata[1784]: Feb 12 19:40:14.504 INFO Fetching http://169.254.169.254/metadata/instance/compute/vmSize?api-version=2017-08-01&format=text: Attempt #1 Feb 12 19:40:14.515209 coreos-metadata[1784]: Feb 12 19:40:14.515 INFO Fetch successful Feb 12 19:40:14.523931 systemd[1]: Finished coreos-metadata.service. Feb 12 19:40:14.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:18.181987 systemd[1]: Stopped kubelet.service. Feb 12 19:40:18.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:18.186643 kernel: kauditd_printk_skb: 186 callbacks suppressed Feb 12 19:40:18.186720 kernel: audit: type=1130 audit(1707766818.181:365): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:18.181000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:18.218192 kernel: audit: type=1131 audit(1707766818.181:366): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:18.217090 systemd[1]: Reloading. Feb 12 19:40:18.307847 /usr/lib/systemd/system-generators/torcx-generator[1842]: time="2024-02-12T19:40:18Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:40:18.308182 /usr/lib/systemd/system-generators/torcx-generator[1842]: time="2024-02-12T19:40:18Z" level=info msg="torcx already run" Feb 12 19:40:18.378519 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:40:18.378541 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:40:18.395919 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:40:18.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.500483 kernel: audit: type=1400 audit(1707766818.466:367): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.500574 kernel: audit: type=1400 audit(1707766818.466:368): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.537376 kernel: audit: type=1400 audit(1707766818.466:369): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.537471 kernel: audit: type=1400 audit(1707766818.466:370): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.537490 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 19:40:18.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.560089 kernel: audit: type=1400 audit(1707766818.466:371): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.560185 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 12 19:40:18.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.583056 kernel: audit: type=1400 audit(1707766818.466:372): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.482000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.482000 audit: BPF prog-id=50 op=LOAD Feb 12 19:40:18.482000 audit: BPF prog-id=35 op=UNLOAD Feb 12 19:40:18.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.483000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.483000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.499000 audit: BPF prog-id=51 op=LOAD Feb 12 19:40:18.499000 audit: BPF prog-id=36 op=UNLOAD Feb 12 19:40:18.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.499000 audit: BPF prog-id=52 op=LOAD Feb 12 19:40:18.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.499000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.499000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.499000 audit: BPF prog-id=53 op=LOAD Feb 12 19:40:18.499000 audit: BPF prog-id=37 op=UNLOAD Feb 12 19:40:18.499000 audit: BPF prog-id=38 op=UNLOAD Feb 12 19:40:18.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.518000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.518000 audit: BPF prog-id=54 op=LOAD Feb 12 19:40:18.518000 audit: BPF prog-id=39 op=UNLOAD Feb 12 19:40:18.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.536000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.536000 audit: BPF prog-id=55 op=LOAD Feb 12 19:40:18.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.566000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.582000 audit: BPF prog-id=59 op=LOAD Feb 12 19:40:18.582000 audit: BPF prog-id=44 op=UNLOAD Feb 12 19:40:18.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.583000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.583000 audit: BPF prog-id=60 op=LOAD Feb 12 19:40:18.583000 audit: BPF prog-id=45 op=UNLOAD Feb 12 19:40:18.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.584000 audit: BPF prog-id=61 op=LOAD Feb 12 19:40:18.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.584000 audit: BPF prog-id=62 op=LOAD Feb 12 19:40:18.584000 audit: BPF prog-id=46 op=UNLOAD Feb 12 19:40:18.584000 audit: BPF prog-id=47 op=UNLOAD Feb 12 19:40:18.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.584000 audit: BPF prog-id=63 op=LOAD Feb 12 19:40:18.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:18.584000 audit: BPF prog-id=64 op=LOAD Feb 12 19:40:18.584000 audit: BPF prog-id=48 op=UNLOAD Feb 12 19:40:18.584000 audit: BPF prog-id=49 op=UNLOAD Feb 12 19:40:18.611814 systemd[1]: Started kubelet.service. Feb 12 19:40:18.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:18.656310 kubelet[1901]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:40:18.656310 kubelet[1901]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 12 19:40:18.656310 kubelet[1901]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:40:18.656642 kubelet[1901]: I0212 19:40:18.656348 1901 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 19:40:19.069285 kubelet[1901]: I0212 19:40:19.069254 1901 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 12 19:40:19.069470 kubelet[1901]: I0212 19:40:19.069459 1901 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 19:40:19.069774 kubelet[1901]: I0212 19:40:19.069759 1901 server.go:895] "Client rotation is on, will bootstrap in background" Feb 12 19:40:19.072021 kubelet[1901]: I0212 19:40:19.071990 1901 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 19:40:19.076548 kubelet[1901]: W0212 19:40:19.076530 1901 machine.go:65] Cannot read vendor id correctly, set empty. Feb 12 19:40:19.077204 kubelet[1901]: I0212 19:40:19.077189 1901 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 19:40:19.077480 kubelet[1901]: I0212 19:40:19.077469 1901 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 19:40:19.077702 kubelet[1901]: I0212 19:40:19.077682 1901 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 12 19:40:19.077853 kubelet[1901]: I0212 19:40:19.077841 1901 topology_manager.go:138] "Creating topology manager with none policy" Feb 12 19:40:19.077916 kubelet[1901]: I0212 19:40:19.077907 1901 container_manager_linux.go:301] "Creating device plugin manager" Feb 12 19:40:19.078066 kubelet[1901]: I0212 19:40:19.078055 1901 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:40:19.078219 kubelet[1901]: I0212 19:40:19.078208 1901 kubelet.go:393] "Attempting to sync node with API server" Feb 12 19:40:19.078286 kubelet[1901]: I0212 19:40:19.078277 1901 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 19:40:19.078350 kubelet[1901]: I0212 19:40:19.078342 1901 kubelet.go:309] "Adding apiserver pod source" Feb 12 19:40:19.078405 kubelet[1901]: I0212 19:40:19.078397 1901 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 19:40:19.078616 kubelet[1901]: E0212 19:40:19.078593 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:19.078661 kubelet[1901]: E0212 19:40:19.078627 1901 file.go:98] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:19.079226 kubelet[1901]: I0212 19:40:19.079204 1901 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 19:40:19.079539 kubelet[1901]: W0212 19:40:19.079512 1901 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 12 19:40:19.079993 kubelet[1901]: I0212 19:40:19.079966 1901 server.go:1232] "Started kubelet" Feb 12 19:40:19.080000 audit[1901]: AVC avc: denied { mac_admin } for pid=1901 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:19.080000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:40:19.080000 audit[1901]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400070d7a0 a1=4000ad2810 a2=400070d770 a3=25 items=0 ppid=1 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:19.080000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:40:19.080000 audit[1901]: AVC avc: denied { mac_admin } for pid=1901 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:19.080000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:40:19.080000 audit[1901]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400072c9a0 a1=4000ad2828 a2=400070d830 a3=25 items=0 ppid=1 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:19.080000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:40:19.081718 kubelet[1901]: I0212 19:40:19.081249 1901 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 19:40:19.081718 kubelet[1901]: I0212 19:40:19.081281 1901 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 19:40:19.081718 kubelet[1901]: I0212 19:40:19.081333 1901 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 19:40:19.083627 kubelet[1901]: E0212 19:40:19.083595 1901 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 19:40:19.083627 kubelet[1901]: E0212 19:40:19.083627 1901 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 19:40:19.083000 audit[1912]: NETFILTER_CFG table=mangle:5 family=2 entries=2 op=nft_register_chain pid=1912 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:19.083000 audit[1912]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffcb15c270 a2=0 a3=1 items=0 ppid=1901 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:19.083000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:40:19.085488 kubelet[1901]: I0212 19:40:19.085459 1901 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 19:40:19.085000 audit[1913]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1913 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:19.085000 audit[1913]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffcc175cd0 a2=0 a3=1 items=0 ppid=1901 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:19.085000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:40:19.086085 kubelet[1901]: I0212 19:40:19.086056 1901 server.go:462] "Adding debug handlers to kubelet server" Feb 12 19:40:19.087009 kubelet[1901]: I0212 19:40:19.086982 1901 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 12 19:40:19.087687 kubelet[1901]: I0212 19:40:19.087664 1901 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 12 19:40:19.087884 kubelet[1901]: I0212 19:40:19.087861 1901 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 12 19:40:19.087000 audit[1915]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1915 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:19.087000 audit[1915]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd567d7b0 a2=0 a3=1 items=0 ppid=1901 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:19.087000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:40:19.089704 kubelet[1901]: I0212 19:40:19.089673 1901 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 19:40:19.089798 kubelet[1901]: I0212 19:40:19.089734 1901 reconciler_new.go:29] "Reconciler: start to sync state" Feb 12 19:40:19.089000 audit[1917]: NETFILTER_CFG table=filter:8 family=2 entries=2 op=nft_register_chain pid=1917 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:19.089000 audit[1917]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd3aedfc0 a2=0 a3=1 items=0 ppid=1901 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:19.089000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:40:19.104147 kubelet[1901]: E0212 19:40:19.103959 1901 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12.17b334dfb2757f67", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.12", UID:"10.200.20.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.12"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 40, 19, 79946087, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 40, 19, 79946087, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.12"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:40:19.105002 kubelet[1901]: W0212 19:40:19.104969 1901 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: nodes "10.200.20.12" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 19:40:19.105101 kubelet[1901]: E0212 19:40:19.105008 1901 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: nodes "10.200.20.12" is forbidden: User "system:anonymous" cannot list resource "nodes" in API group "" at the cluster scope Feb 12 19:40:19.105101 kubelet[1901]: W0212 19:40:19.105087 1901 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 19:40:19.105101 kubelet[1901]: E0212 19:40:19.105097 1901 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: services is forbidden: User "system:anonymous" cannot list resource "services" in API group "" at the cluster scope Feb 12 19:40:19.105478 kubelet[1901]: E0212 19:40:19.105440 1901 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.20.12\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="200ms" Feb 12 19:40:19.105838 kubelet[1901]: W0212 19:40:19.105767 1901 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 19:40:19.105838 kubelet[1901]: E0212 19:40:19.105793 1901 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: csidrivers.storage.k8s.io is forbidden: User "system:anonymous" cannot list resource "csidrivers" in API group "storage.k8s.io" at the cluster scope Feb 12 19:40:19.112107 kubelet[1901]: E0212 19:40:19.111985 1901 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12.17b334dfb2ad8601", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.12", UID:"10.200.20.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.12"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 40, 19, 83617793, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 40, 19, 83617793, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.12"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:40:19.113161 kubelet[1901]: E0212 19:40:19.113095 1901 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12.17b334dfb4613177", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.12", UID:"10.200.20.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.12 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.12"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 40, 19, 112169847, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 40, 19, 112169847, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.12"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:40:19.113519 kubelet[1901]: I0212 19:40:19.113497 1901 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 19:40:19.113519 kubelet[1901]: I0212 19:40:19.113515 1901 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 19:40:19.113616 kubelet[1901]: I0212 19:40:19.113533 1901 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:40:19.114324 kubelet[1901]: E0212 19:40:19.114257 1901 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12.17b334dfb461427f", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.12", UID:"10.200.20.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.12 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.12"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 40, 19, 112174207, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 40, 19, 112174207, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.12"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:40:19.115267 kubelet[1901]: E0212 19:40:19.115196 1901 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12.17b334dfb4615247", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.12", UID:"10.200.20.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.12 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.12"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 40, 19, 112178247, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 40, 19, 112178247, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.12"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:40:19.118860 kubelet[1901]: I0212 19:40:19.118837 1901 policy_none.go:49] "None policy: Start" Feb 12 19:40:19.119489 kubelet[1901]: I0212 19:40:19.119464 1901 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 19:40:19.119560 kubelet[1901]: I0212 19:40:19.119496 1901 state_mem.go:35] "Initializing new in-memory state store" Feb 12 19:40:19.127485 systemd[1]: Created slice kubepods.slice. Feb 12 19:40:19.131559 systemd[1]: Created slice kubepods-besteffort.slice. Feb 12 19:40:19.139725 systemd[1]: Created slice kubepods-burstable.slice. Feb 12 19:40:19.141356 kubelet[1901]: I0212 19:40:19.141329 1901 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 19:40:19.140000 audit[1901]: AVC avc: denied { mac_admin } for pid=1901 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:19.140000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:40:19.140000 audit[1901]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400091f710 a1=4000d68d68 a2=400091f6e0 a3=25 items=0 ppid=1 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:19.140000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:40:19.141647 kubelet[1901]: I0212 19:40:19.141394 1901 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 19:40:19.141647 kubelet[1901]: I0212 19:40:19.141561 1901 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 19:40:19.142966 kubelet[1901]: E0212 19:40:19.142946 1901 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"10.200.20.12\" not found" Feb 12 19:40:19.152796 kubelet[1901]: E0212 19:40:19.152703 1901 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12.17b334dfb6bc28e5", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.12", UID:"10.200.20.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeAllocatableEnforced", Message:"Updated Node Allocatable limit across pods", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.12"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 40, 19, 151685861, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 40, 19, 151685861, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.12"}': 'events is forbidden: User "system:anonymous" cannot create resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:40:19.188643 kubelet[1901]: I0212 19:40:19.188616 1901 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.12" Feb 12 19:40:19.189729 kubelet[1901]: E0212 19:40:19.189690 1901 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.12" Feb 12 19:40:19.189984 kubelet[1901]: E0212 19:40:19.189920 1901 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12.17b334dfb4613177", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.12", UID:"10.200.20.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.12 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.12"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 40, 19, 112169847, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 40, 19, 188559205, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.12"}': 'events "10.200.20.12.17b334dfb4613177" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:40:19.190986 kubelet[1901]: E0212 19:40:19.190910 1901 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12.17b334dfb461427f", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.12", UID:"10.200.20.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.12 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.12"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 40, 19, 112174207, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 40, 19, 188571165, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.12"}': 'events "10.200.20.12.17b334dfb461427f" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:40:19.191796 kubelet[1901]: E0212 19:40:19.191725 1901 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12.17b334dfb4615247", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.12", UID:"10.200.20.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.12 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.12"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 40, 19, 112178247, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 40, 19, 188574125, time.Local), Count:2, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.12"}': 'events "10.200.20.12.17b334dfb4615247" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:40:19.197000 audit[1924]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1924 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:19.197000 audit[1924]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffebd08d30 a2=0 a3=1 items=0 ppid=1901 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:19.197000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 12 19:40:19.198621 kubelet[1901]: I0212 19:40:19.198601 1901 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 12 19:40:19.198000 audit[1925]: NETFILTER_CFG table=mangle:10 family=2 entries=1 op=nft_register_chain pid=1925 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:19.198000 audit[1925]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffccc29f60 a2=0 a3=1 items=0 ppid=1901 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:19.198000 audit[1926]: NETFILTER_CFG table=mangle:11 family=10 entries=2 op=nft_register_chain pid=1926 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:19.198000 audit[1926]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe1693ea0 a2=0 a3=1 items=0 ppid=1901 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:19.198000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:40:19.200051 kubelet[1901]: I0212 19:40:19.200035 1901 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 12 19:40:19.200125 kubelet[1901]: I0212 19:40:19.200116 1901 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 12 19:40:19.200189 kubelet[1901]: I0212 19:40:19.200181 1901 kubelet.go:2303] "Starting kubelet main sync loop" Feb 12 19:40:19.200288 kubelet[1901]: E0212 19:40:19.200280 1901 kubelet.go:2327] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 12 19:40:19.198000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:40:19.201584 kubelet[1901]: W0212 19:40:19.201559 1901 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 19:40:19.201684 kubelet[1901]: E0212 19:40:19.201588 1901 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: runtimeclasses.node.k8s.io is forbidden: User "system:anonymous" cannot list resource "runtimeclasses" in API group "node.k8s.io" at the cluster scope Feb 12 19:40:19.201000 audit[1927]: NETFILTER_CFG table=mangle:12 family=10 entries=1 op=nft_register_chain pid=1927 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:19.201000 audit[1927]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffacc3cc0 a2=0 a3=1 items=0 ppid=1901 pid=1927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:19.201000 audit[1928]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1928 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:19.201000 audit[1928]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffc8afd510 a2=0 a3=1 items=0 ppid=1901 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:19.201000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:40:19.201000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:40:19.202000 audit[1930]: NETFILTER_CFG table=nat:14 family=10 entries=2 op=nft_register_chain pid=1930 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:19.202000 audit[1930]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=fffff479fe30 a2=0 a3=1 items=0 ppid=1901 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:19.202000 audit[1929]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_chain pid=1929 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:19.202000 audit[1929]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff021b6a0 a2=0 a3=1 items=0 ppid=1901 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:19.202000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:40:19.202000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:40:19.204000 audit[1931]: NETFILTER_CFG table=filter:16 family=10 entries=2 op=nft_register_chain pid=1931 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:19.204000 audit[1931]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff61a9650 a2=0 a3=1 items=0 ppid=1901 pid=1931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:19.204000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:40:19.306684 kubelet[1901]: E0212 19:40:19.306659 1901 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.20.12\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="400ms" Feb 12 19:40:19.390376 kubelet[1901]: I0212 19:40:19.390354 1901 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.12" Feb 12 19:40:19.391598 kubelet[1901]: E0212 19:40:19.391522 1901 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12.17b334dfb4613177", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.12", UID:"10.200.20.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.12 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.12"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 40, 19, 112169847, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 40, 19, 390296578, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.12"}': 'events "10.200.20.12.17b334dfb4613177" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:40:19.391988 kubelet[1901]: E0212 19:40:19.391874 1901 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.12" Feb 12 19:40:19.392794 kubelet[1901]: E0212 19:40:19.392723 1901 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12.17b334dfb461427f", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.12", UID:"10.200.20.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.12 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.12"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 40, 19, 112174207, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 40, 19, 390301338, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.12"}': 'events "10.200.20.12.17b334dfb461427f" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:40:19.393517 kubelet[1901]: E0212 19:40:19.393453 1901 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12.17b334dfb4615247", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.12", UID:"10.200.20.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.12 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.12"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 40, 19, 112178247, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 40, 19, 390303898, time.Local), Count:3, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.12"}': 'events "10.200.20.12.17b334dfb4615247" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:40:19.708287 kubelet[1901]: E0212 19:40:19.708191 1901 controller.go:146] "Failed to ensure lease exists, will retry" err="leases.coordination.k8s.io \"10.200.20.12\" is forbidden: User \"system:anonymous\" cannot get resource \"leases\" in API group \"coordination.k8s.io\" in the namespace \"kube-node-lease\"" interval="800ms" Feb 12 19:40:19.793113 kubelet[1901]: I0212 19:40:19.793088 1901 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.12" Feb 12 19:40:19.794175 kubelet[1901]: E0212 19:40:19.794156 1901 kubelet_node_status.go:92] "Unable to register node with API server" err="nodes is forbidden: User \"system:anonymous\" cannot create resource \"nodes\" in API group \"\" at the cluster scope" node="10.200.20.12" Feb 12 19:40:19.794470 kubelet[1901]: E0212 19:40:19.794402 1901 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12.17b334dfb4613177", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.12", UID:"10.200.20.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientMemory", Message:"Node 10.200.20.12 status is now: NodeHasSufficientMemory", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.12"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 40, 19, 112169847, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 40, 19, 793027247, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.12"}': 'events "10.200.20.12.17b334dfb4613177" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:40:19.795388 kubelet[1901]: E0212 19:40:19.795327 1901 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12.17b334dfb461427f", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.12", UID:"10.200.20.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasNoDiskPressure", Message:"Node 10.200.20.12 status is now: NodeHasNoDiskPressure", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.12"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 40, 19, 112174207, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 40, 19, 793056287, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.12"}': 'events "10.200.20.12.17b334dfb461427f" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:40:19.796102 kubelet[1901]: E0212 19:40:19.796040 1901 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12.17b334dfb4615247", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"10.200.20.12", UID:"10.200.20.12", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"NodeHasSufficientPID", Message:"Node 10.200.20.12 status is now: NodeHasSufficientPID", Source:v1.EventSource{Component:"kubelet", Host:"10.200.20.12"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 40, 19, 112178247, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 40, 19, 793059607, time.Local), Count:4, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"10.200.20.12"}': 'events "10.200.20.12.17b334dfb4615247" is forbidden: User "system:anonymous" cannot patch resource "events" in API group "" in the namespace "default"' (will not retry!) Feb 12 19:40:20.071839 kubelet[1901]: I0212 19:40:20.071749 1901 transport.go:147] "Certificate rotation detected, shutting down client connections to start using new credentials" Feb 12 19:40:20.079011 kubelet[1901]: E0212 19:40:20.078988 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:20.460001 kubelet[1901]: E0212 19:40:20.459973 1901 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "10.200.20.12" not found Feb 12 19:40:20.512923 kubelet[1901]: E0212 19:40:20.512882 1901 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"10.200.20.12\" not found" node="10.200.20.12" Feb 12 19:40:20.595436 kubelet[1901]: I0212 19:40:20.595413 1901 kubelet_node_status.go:70] "Attempting to register node" node="10.200.20.12" Feb 12 19:40:20.598728 kubelet[1901]: I0212 19:40:20.598705 1901 kubelet_node_status.go:73] "Successfully registered node" node="10.200.20.12" Feb 12 19:40:20.640591 sudo[1689]: pam_unix(sudo:session): session closed for user root Feb 12 19:40:20.638000 audit[1689]: USER_END pid=1689 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:40:20.638000 audit[1689]: CRED_DISP pid=1689 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:40:20.705206 sshd[1686]: pam_unix(sshd:session): session closed for user core Feb 12 19:40:20.704000 audit[1686]: USER_END pid=1686 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:20.704000 audit[1686]: CRED_DISP pid=1686 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:20.707625 systemd[1]: session-9.scope: Deactivated successfully. Feb 12 19:40:20.708309 systemd-logind[1334]: Session 9 logged out. Waiting for processes to exit. Feb 12 19:40:20.708400 systemd[1]: sshd@6-10.200.20.12:22-10.200.12.6:51174.service: Deactivated successfully. Feb 12 19:40:20.706000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.12:22-10.200.12.6:51174 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:20.709807 systemd-logind[1334]: Removed session 9. Feb 12 19:40:20.710138 kubelet[1901]: I0212 19:40:20.709916 1901 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.1.0/24" Feb 12 19:40:20.710329 env[1347]: time="2024-02-12T19:40:20.710244643Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 12 19:40:20.710484 kubelet[1901]: I0212 19:40:20.710427 1901 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.1.0/24" Feb 12 19:40:21.079988 kubelet[1901]: E0212 19:40:21.079900 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:21.080111 kubelet[1901]: I0212 19:40:21.080088 1901 apiserver.go:52] "Watching apiserver" Feb 12 19:40:21.082507 kubelet[1901]: I0212 19:40:21.082482 1901 topology_manager.go:215] "Topology Admit Handler" podUID="7d832c0b-3b96-4fde-bcb8-e9dfca97ceb1" podNamespace="calico-system" podName="calico-node-zjzkz" Feb 12 19:40:21.082798 kubelet[1901]: I0212 19:40:21.082772 1901 topology_manager.go:215] "Topology Admit Handler" podUID="5067e866-4534-40f4-9993-6dcb1c81e037" podNamespace="calico-system" podName="csi-node-driver-xlm9b" Feb 12 19:40:21.082878 kubelet[1901]: I0212 19:40:21.082833 1901 topology_manager.go:215] "Topology Admit Handler" podUID="6cbd5d4a-0d90-4bd3-8a80-d6e6e2618698" podNamespace="kube-system" podName="kube-proxy-sxfwd" Feb 12 19:40:21.083255 kubelet[1901]: E0212 19:40:21.083185 1901 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xlm9b" podUID="5067e866-4534-40f4-9993-6dcb1c81e037" Feb 12 19:40:21.087403 systemd[1]: Created slice kubepods-besteffort-pod6cbd5d4a_0d90_4bd3_8a80_d6e6e2618698.slice. Feb 12 19:40:21.090158 kubelet[1901]: I0212 19:40:21.090112 1901 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 19:40:21.094031 systemd[1]: Created slice kubepods-besteffort-pod7d832c0b_3b96_4fde_bcb8_e9dfca97ceb1.slice. Feb 12 19:40:21.097246 kubelet[1901]: I0212 19:40:21.097213 1901 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/6cbd5d4a-0d90-4bd3-8a80-d6e6e2618698-lib-modules\") pod \"kube-proxy-sxfwd\" (UID: \"6cbd5d4a-0d90-4bd3-8a80-d6e6e2618698\") " pod="kube-system/kube-proxy-sxfwd" Feb 12 19:40:21.097345 kubelet[1901]: I0212 19:40:21.097260 1901 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/5067e866-4534-40f4-9993-6dcb1c81e037-registration-dir\") pod \"csi-node-driver-xlm9b\" (UID: \"5067e866-4534-40f4-9993-6dcb1c81e037\") " pod="calico-system/csi-node-driver-xlm9b" Feb 12 19:40:21.097345 kubelet[1901]: I0212 19:40:21.097292 1901 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/7d832c0b-3b96-4fde-bcb8-e9dfca97ceb1-policysync\") pod \"calico-node-zjzkz\" (UID: \"7d832c0b-3b96-4fde-bcb8-e9dfca97ceb1\") " pod="calico-system/calico-node-zjzkz" Feb 12 19:40:21.097345 kubelet[1901]: I0212 19:40:21.097315 1901 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/7d832c0b-3b96-4fde-bcb8-e9dfca97ceb1-var-run-calico\") pod \"calico-node-zjzkz\" (UID: \"7d832c0b-3b96-4fde-bcb8-e9dfca97ceb1\") " pod="calico-system/calico-node-zjzkz" Feb 12 19:40:21.097412 kubelet[1901]: I0212 19:40:21.097337 1901 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/5067e866-4534-40f4-9993-6dcb1c81e037-socket-dir\") pod \"csi-node-driver-xlm9b\" (UID: \"5067e866-4534-40f4-9993-6dcb1c81e037\") " pod="calico-system/csi-node-driver-xlm9b" Feb 12 19:40:21.097412 kubelet[1901]: I0212 19:40:21.097368 1901 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vzpvf\" (UniqueName: \"kubernetes.io/projected/5067e866-4534-40f4-9993-6dcb1c81e037-kube-api-access-vzpvf\") pod \"csi-node-driver-xlm9b\" (UID: \"5067e866-4534-40f4-9993-6dcb1c81e037\") " pod="calico-system/csi-node-driver-xlm9b" Feb 12 19:40:21.097412 kubelet[1901]: I0212 19:40:21.097385 1901 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/7d832c0b-3b96-4fde-bcb8-e9dfca97ceb1-xtables-lock\") pod \"calico-node-zjzkz\" (UID: \"7d832c0b-3b96-4fde-bcb8-e9dfca97ceb1\") " pod="calico-system/calico-node-zjzkz" Feb 12 19:40:21.097412 kubelet[1901]: I0212 19:40:21.097404 1901 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/7d832c0b-3b96-4fde-bcb8-e9dfca97ceb1-node-certs\") pod \"calico-node-zjzkz\" (UID: \"7d832c0b-3b96-4fde-bcb8-e9dfca97ceb1\") " pod="calico-system/calico-node-zjzkz" Feb 12 19:40:21.097491 kubelet[1901]: I0212 19:40:21.097432 1901 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/7d832c0b-3b96-4fde-bcb8-e9dfca97ceb1-cni-bin-dir\") pod \"calico-node-zjzkz\" (UID: \"7d832c0b-3b96-4fde-bcb8-e9dfca97ceb1\") " pod="calico-system/calico-node-zjzkz" Feb 12 19:40:21.097491 kubelet[1901]: I0212 19:40:21.097453 1901 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/7d832c0b-3b96-4fde-bcb8-e9dfca97ceb1-flexvol-driver-host\") pod \"calico-node-zjzkz\" (UID: \"7d832c0b-3b96-4fde-bcb8-e9dfca97ceb1\") " pod="calico-system/calico-node-zjzkz" Feb 12 19:40:21.097491 kubelet[1901]: I0212 19:40:21.097472 1901 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h56tj\" (UniqueName: \"kubernetes.io/projected/6cbd5d4a-0d90-4bd3-8a80-d6e6e2618698-kube-api-access-h56tj\") pod \"kube-proxy-sxfwd\" (UID: \"6cbd5d4a-0d90-4bd3-8a80-d6e6e2618698\") " pod="kube-system/kube-proxy-sxfwd" Feb 12 19:40:21.097491 kubelet[1901]: I0212 19:40:21.097490 1901 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/7d832c0b-3b96-4fde-bcb8-e9dfca97ceb1-lib-modules\") pod \"calico-node-zjzkz\" (UID: \"7d832c0b-3b96-4fde-bcb8-e9dfca97ceb1\") " pod="calico-system/calico-node-zjzkz" Feb 12 19:40:21.097570 kubelet[1901]: I0212 19:40:21.097519 1901 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/7d832c0b-3b96-4fde-bcb8-e9dfca97ceb1-var-lib-calico\") pod \"calico-node-zjzkz\" (UID: \"7d832c0b-3b96-4fde-bcb8-e9dfca97ceb1\") " pod="calico-system/calico-node-zjzkz" Feb 12 19:40:21.097570 kubelet[1901]: I0212 19:40:21.097539 1901 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/7d832c0b-3b96-4fde-bcb8-e9dfca97ceb1-cni-net-dir\") pod \"calico-node-zjzkz\" (UID: \"7d832c0b-3b96-4fde-bcb8-e9dfca97ceb1\") " pod="calico-system/calico-node-zjzkz" Feb 12 19:40:21.097570 kubelet[1901]: I0212 19:40:21.097557 1901 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/7d832c0b-3b96-4fde-bcb8-e9dfca97ceb1-cni-log-dir\") pod \"calico-node-zjzkz\" (UID: \"7d832c0b-3b96-4fde-bcb8-e9dfca97ceb1\") " pod="calico-system/calico-node-zjzkz" Feb 12 19:40:21.097629 kubelet[1901]: I0212 19:40:21.097583 1901 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b5nqw\" (UniqueName: \"kubernetes.io/projected/7d832c0b-3b96-4fde-bcb8-e9dfca97ceb1-kube-api-access-b5nqw\") pod \"calico-node-zjzkz\" (UID: \"7d832c0b-3b96-4fde-bcb8-e9dfca97ceb1\") " pod="calico-system/calico-node-zjzkz" Feb 12 19:40:21.097629 kubelet[1901]: I0212 19:40:21.097602 1901 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/5067e866-4534-40f4-9993-6dcb1c81e037-varrun\") pod \"csi-node-driver-xlm9b\" (UID: \"5067e866-4534-40f4-9993-6dcb1c81e037\") " pod="calico-system/csi-node-driver-xlm9b" Feb 12 19:40:21.097629 kubelet[1901]: I0212 19:40:21.097620 1901 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/5067e866-4534-40f4-9993-6dcb1c81e037-kubelet-dir\") pod \"csi-node-driver-xlm9b\" (UID: \"5067e866-4534-40f4-9993-6dcb1c81e037\") " pod="calico-system/csi-node-driver-xlm9b" Feb 12 19:40:21.097688 kubelet[1901]: I0212 19:40:21.097638 1901 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/6cbd5d4a-0d90-4bd3-8a80-d6e6e2618698-kube-proxy\") pod \"kube-proxy-sxfwd\" (UID: \"6cbd5d4a-0d90-4bd3-8a80-d6e6e2618698\") " pod="kube-system/kube-proxy-sxfwd" Feb 12 19:40:21.097688 kubelet[1901]: I0212 19:40:21.097667 1901 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/7d832c0b-3b96-4fde-bcb8-e9dfca97ceb1-tigera-ca-bundle\") pod \"calico-node-zjzkz\" (UID: \"7d832c0b-3b96-4fde-bcb8-e9dfca97ceb1\") " pod="calico-system/calico-node-zjzkz" Feb 12 19:40:21.097763 kubelet[1901]: I0212 19:40:21.097686 1901 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/6cbd5d4a-0d90-4bd3-8a80-d6e6e2618698-xtables-lock\") pod \"kube-proxy-sxfwd\" (UID: \"6cbd5d4a-0d90-4bd3-8a80-d6e6e2618698\") " pod="kube-system/kube-proxy-sxfwd" Feb 12 19:40:21.199689 kubelet[1901]: E0212 19:40:21.199641 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.199689 kubelet[1901]: W0212 19:40:21.199670 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.199689 kubelet[1901]: E0212 19:40:21.199691 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.199907 kubelet[1901]: E0212 19:40:21.199839 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.199907 kubelet[1901]: W0212 19:40:21.199846 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.199907 kubelet[1901]: E0212 19:40:21.199858 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.199974 kubelet[1901]: E0212 19:40:21.199964 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.199974 kubelet[1901]: W0212 19:40:21.199970 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.200017 kubelet[1901]: E0212 19:40:21.199979 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.200145 kubelet[1901]: E0212 19:40:21.200120 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.200145 kubelet[1901]: W0212 19:40:21.200135 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.200145 kubelet[1901]: E0212 19:40:21.200145 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.200304 kubelet[1901]: E0212 19:40:21.200281 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.200304 kubelet[1901]: W0212 19:40:21.200294 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.200304 kubelet[1901]: E0212 19:40:21.200303 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.200453 kubelet[1901]: E0212 19:40:21.200433 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.200453 kubelet[1901]: W0212 19:40:21.200446 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.200453 kubelet[1901]: E0212 19:40:21.200455 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.200572 kubelet[1901]: E0212 19:40:21.200555 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.200572 kubelet[1901]: W0212 19:40:21.200567 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.200629 kubelet[1901]: E0212 19:40:21.200576 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.200716 kubelet[1901]: E0212 19:40:21.200699 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.200716 kubelet[1901]: W0212 19:40:21.200710 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.200794 kubelet[1901]: E0212 19:40:21.200719 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.201286 kubelet[1901]: E0212 19:40:21.201254 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.201286 kubelet[1901]: W0212 19:40:21.201275 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.201286 kubelet[1901]: E0212 19:40:21.201288 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.205255 kubelet[1901]: E0212 19:40:21.205217 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.205255 kubelet[1901]: W0212 19:40:21.205243 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.205376 kubelet[1901]: E0212 19:40:21.205260 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.205402 kubelet[1901]: E0212 19:40:21.205385 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.205402 kubelet[1901]: W0212 19:40:21.205392 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.205402 kubelet[1901]: E0212 19:40:21.205401 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.205518 kubelet[1901]: E0212 19:40:21.205499 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.205518 kubelet[1901]: W0212 19:40:21.205513 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.205569 kubelet[1901]: E0212 19:40:21.205525 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.205895 kubelet[1901]: E0212 19:40:21.205871 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.205895 kubelet[1901]: W0212 19:40:21.205888 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.205895 kubelet[1901]: E0212 19:40:21.205901 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.207125 kubelet[1901]: E0212 19:40:21.207111 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.207353 kubelet[1901]: W0212 19:40:21.207338 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.207506 kubelet[1901]: E0212 19:40:21.207494 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.207864 kubelet[1901]: E0212 19:40:21.207850 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.207939 kubelet[1901]: W0212 19:40:21.207927 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.208017 kubelet[1901]: E0212 19:40:21.208008 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.208217 kubelet[1901]: E0212 19:40:21.208204 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.208285 kubelet[1901]: W0212 19:40:21.208274 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.208350 kubelet[1901]: E0212 19:40:21.208341 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.208558 kubelet[1901]: E0212 19:40:21.208547 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.208634 kubelet[1901]: W0212 19:40:21.208620 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.208689 kubelet[1901]: E0212 19:40:21.208681 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.208907 kubelet[1901]: E0212 19:40:21.208896 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.208985 kubelet[1901]: W0212 19:40:21.208973 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.209069 kubelet[1901]: E0212 19:40:21.209049 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.209253 kubelet[1901]: E0212 19:40:21.209241 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.209317 kubelet[1901]: W0212 19:40:21.209307 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.209388 kubelet[1901]: E0212 19:40:21.209372 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.209567 kubelet[1901]: E0212 19:40:21.209556 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.209636 kubelet[1901]: W0212 19:40:21.209626 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.209713 kubelet[1901]: E0212 19:40:21.209698 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.209901 kubelet[1901]: E0212 19:40:21.209890 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.209964 kubelet[1901]: W0212 19:40:21.209954 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.210053 kubelet[1901]: E0212 19:40:21.210036 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.210229 kubelet[1901]: E0212 19:40:21.210217 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.210296 kubelet[1901]: W0212 19:40:21.210286 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.210382 kubelet[1901]: E0212 19:40:21.210366 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.210555 kubelet[1901]: E0212 19:40:21.210543 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.210616 kubelet[1901]: W0212 19:40:21.210606 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.210688 kubelet[1901]: E0212 19:40:21.210672 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.210920 kubelet[1901]: E0212 19:40:21.210908 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.210990 kubelet[1901]: W0212 19:40:21.210980 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.211078 kubelet[1901]: E0212 19:40:21.211061 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.211260 kubelet[1901]: E0212 19:40:21.211249 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.211333 kubelet[1901]: W0212 19:40:21.211322 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.211405 kubelet[1901]: E0212 19:40:21.211389 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.211580 kubelet[1901]: E0212 19:40:21.211569 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.211644 kubelet[1901]: W0212 19:40:21.211634 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.211720 kubelet[1901]: E0212 19:40:21.211705 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.211942 kubelet[1901]: E0212 19:40:21.211930 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.212011 kubelet[1901]: W0212 19:40:21.212000 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.212087 kubelet[1901]: E0212 19:40:21.212072 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.212274 kubelet[1901]: E0212 19:40:21.212264 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.212340 kubelet[1901]: W0212 19:40:21.212330 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.212420 kubelet[1901]: E0212 19:40:21.212404 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.212590 kubelet[1901]: E0212 19:40:21.212579 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.212656 kubelet[1901]: W0212 19:40:21.212646 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.212730 kubelet[1901]: E0212 19:40:21.212714 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.212920 kubelet[1901]: E0212 19:40:21.212909 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.212985 kubelet[1901]: W0212 19:40:21.212975 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.213071 kubelet[1901]: E0212 19:40:21.213056 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.213259 kubelet[1901]: E0212 19:40:21.213247 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.213323 kubelet[1901]: W0212 19:40:21.213313 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.213449 kubelet[1901]: E0212 19:40:21.213439 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.213586 kubelet[1901]: E0212 19:40:21.213576 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.213645 kubelet[1901]: W0212 19:40:21.213634 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.213791 kubelet[1901]: E0212 19:40:21.213714 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.213981 kubelet[1901]: E0212 19:40:21.213968 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.214046 kubelet[1901]: W0212 19:40:21.214036 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.214119 kubelet[1901]: E0212 19:40:21.214102 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.214284 kubelet[1901]: E0212 19:40:21.214274 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.214348 kubelet[1901]: W0212 19:40:21.214338 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.214436 kubelet[1901]: E0212 19:40:21.214419 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.214635 kubelet[1901]: E0212 19:40:21.214624 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.214704 kubelet[1901]: W0212 19:40:21.214694 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.214809 kubelet[1901]: E0212 19:40:21.214793 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.214984 kubelet[1901]: E0212 19:40:21.214972 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.215052 kubelet[1901]: W0212 19:40:21.215040 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.215151 kubelet[1901]: E0212 19:40:21.215132 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.215347 kubelet[1901]: E0212 19:40:21.215335 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.215479 kubelet[1901]: W0212 19:40:21.215448 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.215659 kubelet[1901]: E0212 19:40:21.215646 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.215847 kubelet[1901]: E0212 19:40:21.215836 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.215927 kubelet[1901]: W0212 19:40:21.215914 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.216016 kubelet[1901]: E0212 19:40:21.215996 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.216215 kubelet[1901]: E0212 19:40:21.216202 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.216287 kubelet[1901]: W0212 19:40:21.216275 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.216340 kubelet[1901]: E0212 19:40:21.216331 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.259089 kubelet[1901]: E0212 19:40:21.259065 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.259227 kubelet[1901]: W0212 19:40:21.259213 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.259307 kubelet[1901]: E0212 19:40:21.259297 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.259538 kubelet[1901]: E0212 19:40:21.259518 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.259538 kubelet[1901]: W0212 19:40:21.259534 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.259620 kubelet[1901]: E0212 19:40:21.259548 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.265055 kubelet[1901]: E0212 19:40:21.265037 1901 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:21.265161 kubelet[1901]: W0212 19:40:21.265148 1901 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:21.265239 kubelet[1901]: E0212 19:40:21.265230 1901 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:21.393295 env[1347]: time="2024-02-12T19:40:21.393250181Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-sxfwd,Uid:6cbd5d4a-0d90-4bd3-8a80-d6e6e2618698,Namespace:kube-system,Attempt:0,}" Feb 12 19:40:21.399050 env[1347]: time="2024-02-12T19:40:21.398888241Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-zjzkz,Uid:7d832c0b-3b96-4fde-bcb8-e9dfca97ceb1,Namespace:calico-system,Attempt:0,}" Feb 12 19:40:22.081093 kubelet[1901]: E0212 19:40:22.081053 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:22.893629 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4057435945.mount: Deactivated successfully. Feb 12 19:40:22.918839 env[1347]: time="2024-02-12T19:40:22.918793166Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:22.929409 env[1347]: time="2024-02-12T19:40:22.929368370Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:22.933192 env[1347]: time="2024-02-12T19:40:22.933147757Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:22.939724 env[1347]: time="2024-02-12T19:40:22.939678894Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:22.944469 env[1347]: time="2024-02-12T19:40:22.944439078Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:22.946831 env[1347]: time="2024-02-12T19:40:22.946799870Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:22.954721 env[1347]: time="2024-02-12T19:40:22.954688123Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:22.955317 env[1347]: time="2024-02-12T19:40:22.955294761Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:22.994282 env[1347]: time="2024-02-12T19:40:22.994198909Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:40:22.994402 env[1347]: time="2024-02-12T19:40:22.994288108Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:40:22.994402 env[1347]: time="2024-02-12T19:40:22.994329188Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:40:22.994694 env[1347]: time="2024-02-12T19:40:22.994599027Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/356975c0cd33158531687cd142f10f185fc59a4abf98939d33008fbcccff49c4 pid=1987 runtime=io.containerd.runc.v2 Feb 12 19:40:23.018268 systemd[1]: Started cri-containerd-356975c0cd33158531687cd142f10f185fc59a4abf98939d33008fbcccff49c4.scope. Feb 12 19:40:23.023714 env[1347]: time="2024-02-12T19:40:23.021681137Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:40:23.023714 env[1347]: time="2024-02-12T19:40:23.021732497Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:40:23.023714 env[1347]: time="2024-02-12T19:40:23.021762497Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:40:23.023714 env[1347]: time="2024-02-12T19:40:23.021891336Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4ac4c223e757d07a610cc08ee2bae7f4afe22618261db7891dd3ada1f9142a6d pid=2014 runtime=io.containerd.runc.v2 Feb 12 19:40:23.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.032000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.033000 audit: BPF prog-id=65 op=LOAD Feb 12 19:40:23.034000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.034000 audit[1998]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1987 pid=1998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:23.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335363937356330636433333135383533313638376364313432663130 Feb 12 19:40:23.034000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.034000 audit[1998]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1987 pid=1998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:23.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335363937356330636433333135383533313638376364313432663130 Feb 12 19:40:23.034000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.034000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.034000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.034000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.034000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.034000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.034000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.034000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.034000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.034000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.034000 audit: BPF prog-id=66 op=LOAD Feb 12 19:40:23.034000 audit[1998]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1987 pid=1998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:23.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335363937356330636433333135383533313638376364313432663130 Feb 12 19:40:23.035000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.035000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.035000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.035000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.035000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.035000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.035000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.035000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.035000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.035000 audit: BPF prog-id=67 op=LOAD Feb 12 19:40:23.035000 audit[1998]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1987 pid=1998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:23.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335363937356330636433333135383533313638376364313432663130 Feb 12 19:40:23.035000 audit: BPF prog-id=67 op=UNLOAD Feb 12 19:40:23.035000 audit: BPF prog-id=66 op=UNLOAD Feb 12 19:40:23.035000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.035000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.035000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.035000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.035000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.035000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.035000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.035000 audit[1998]: AVC avc: denied { perfmon } for pid=1998 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.035000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.035000 audit[1998]: AVC avc: denied { bpf } for pid=1998 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.035000 audit: BPF prog-id=68 op=LOAD Feb 12 19:40:23.035000 audit[1998]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1987 pid=1998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:23.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335363937356330636433333135383533313638376364313432663130 Feb 12 19:40:23.050270 systemd[1]: Started cri-containerd-4ac4c223e757d07a610cc08ee2bae7f4afe22618261db7891dd3ada1f9142a6d.scope. Feb 12 19:40:23.056863 env[1347]: time="2024-02-12T19:40:23.056573141Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-zjzkz,Uid:7d832c0b-3b96-4fde-bcb8-e9dfca97ceb1,Namespace:calico-system,Attempt:0,} returns sandbox id \"356975c0cd33158531687cd142f10f185fc59a4abf98939d33008fbcccff49c4\"" Feb 12 19:40:23.058907 env[1347]: time="2024-02-12T19:40:23.058863854Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 12 19:40:23.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.065000 audit: BPF prog-id=69 op=LOAD Feb 12 19:40:23.066000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.066000 audit[2032]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2014 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:23.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461633463323233653735376430376136313063633038656532626165 Feb 12 19:40:23.066000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.066000 audit[2032]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2014 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:23.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461633463323233653735376430376136313063633038656532626165 Feb 12 19:40:23.066000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.066000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.066000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.066000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.066000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.066000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.066000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.066000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.066000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.066000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.066000 audit: BPF prog-id=70 op=LOAD Feb 12 19:40:23.066000 audit[2032]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2014 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:23.066000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461633463323233653735376430376136313063633038656532626165 Feb 12 19:40:23.067000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.067000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.067000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.067000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.067000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.067000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.067000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.067000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.067000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.067000 audit: BPF prog-id=71 op=LOAD Feb 12 19:40:23.067000 audit[2032]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2014 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:23.067000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461633463323233653735376430376136313063633038656532626165 Feb 12 19:40:23.067000 audit: BPF prog-id=71 op=UNLOAD Feb 12 19:40:23.067000 audit: BPF prog-id=70 op=UNLOAD Feb 12 19:40:23.067000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.067000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.067000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.067000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.067000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.067000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.067000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.067000 audit[2032]: AVC avc: denied { perfmon } for pid=2032 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.067000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.067000 audit[2032]: AVC avc: denied { bpf } for pid=2032 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:23.067000 audit: BPF prog-id=72 op=LOAD Feb 12 19:40:23.067000 audit[2032]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2014 pid=2032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:23.067000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461633463323233653735376430376136313063633038656532626165 Feb 12 19:40:23.080207 env[1347]: time="2024-02-12T19:40:23.080154663Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-sxfwd,Uid:6cbd5d4a-0d90-4bd3-8a80-d6e6e2618698,Namespace:kube-system,Attempt:0,} returns sandbox id \"4ac4c223e757d07a610cc08ee2bae7f4afe22618261db7891dd3ada1f9142a6d\"" Feb 12 19:40:23.081467 kubelet[1901]: E0212 19:40:23.081441 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:23.201288 kubelet[1901]: E0212 19:40:23.200848 1901 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xlm9b" podUID="5067e866-4534-40f4-9993-6dcb1c81e037" Feb 12 19:40:24.082387 kubelet[1901]: E0212 19:40:24.082353 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:24.584406 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2839867873.mount: Deactivated successfully. Feb 12 19:40:24.738844 env[1347]: time="2024-02-12T19:40:24.738801830Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:24.745454 env[1347]: time="2024-02-12T19:40:24.745419729Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:24.750807 env[1347]: time="2024-02-12T19:40:24.750773031Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:24.756047 env[1347]: time="2024-02-12T19:40:24.756014454Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:24.756714 env[1347]: time="2024-02-12T19:40:24.756689932Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57\"" Feb 12 19:40:24.758375 env[1347]: time="2024-02-12T19:40:24.758342927Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\"" Feb 12 19:40:24.759384 env[1347]: time="2024-02-12T19:40:24.759357724Z" level=info msg="CreateContainer within sandbox \"356975c0cd33158531687cd142f10f185fc59a4abf98939d33008fbcccff49c4\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 19:40:24.789273 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3251932798.mount: Deactivated successfully. Feb 12 19:40:24.805855 env[1347]: time="2024-02-12T19:40:24.805804814Z" level=info msg="CreateContainer within sandbox \"356975c0cd33158531687cd142f10f185fc59a4abf98939d33008fbcccff49c4\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"2cc98ad27fb9e76cd64deaf113b28d3df127d7a29fb96624ff65b2ca2cf97333\"" Feb 12 19:40:24.806673 env[1347]: time="2024-02-12T19:40:24.806642851Z" level=info msg="StartContainer for \"2cc98ad27fb9e76cd64deaf113b28d3df127d7a29fb96624ff65b2ca2cf97333\"" Feb 12 19:40:24.822986 systemd[1]: Started cri-containerd-2cc98ad27fb9e76cd64deaf113b28d3df127d7a29fb96624ff65b2ca2cf97333.scope. Feb 12 19:40:24.834000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:24.841001 kernel: kauditd_printk_skb: 394 callbacks suppressed Feb 12 19:40:24.841072 kernel: audit: type=1400 audit(1707766824.834:565): avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:24.834000 audit[2072]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1987 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:24.887128 kernel: audit: type=1300 audit(1707766824.834:565): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1987 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:24.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263633938616432376662396537366364363464656166313133623238 Feb 12 19:40:24.913360 kernel: audit: type=1327 audit(1707766824.834:565): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263633938616432376662396537366364363464656166313133623238 Feb 12 19:40:24.915878 kernel: audit: type=1400 audit(1707766824.834:566): avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:24.834000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:24.834000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:24.956724 kernel: audit: type=1400 audit(1707766824.834:566): avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:24.957072 kernel: audit: type=1400 audit(1707766824.834:566): avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:24.834000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:24.970265 kernel: audit: type=1400 audit(1707766824.834:566): avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:24.834000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:24.969545 systemd[1]: cri-containerd-2cc98ad27fb9e76cd64deaf113b28d3df127d7a29fb96624ff65b2ca2cf97333.scope: Deactivated successfully. Feb 12 19:40:24.834000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:25.006323 kernel: audit: type=1400 audit(1707766824.834:566): avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:24.834000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:25.024375 kernel: audit: type=1400 audit(1707766824.834:566): avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:25.024681 env[1347]: time="2024-02-12T19:40:25.024639030Z" level=info msg="StartContainer for \"2cc98ad27fb9e76cd64deaf113b28d3df127d7a29fb96624ff65b2ca2cf97333\" returns successfully" Feb 12 19:40:24.834000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:25.043020 kernel: audit: type=1400 audit(1707766824.834:566): avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:24.834000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:24.834000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:24.834000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:24.834000 audit: BPF prog-id=73 op=LOAD Feb 12 19:40:24.834000 audit[2072]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1987 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:24.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263633938616432376662396537366364363464656166313133623238 Feb 12 19:40:24.839000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:24.839000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:24.839000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:24.839000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:24.839000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:24.839000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:24.839000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:24.839000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:24.839000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:24.839000 audit: BPF prog-id=74 op=LOAD Feb 12 19:40:24.839000 audit[2072]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1987 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:24.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263633938616432376662396537366364363464656166313133623238 Feb 12 19:40:24.857000 audit: BPF prog-id=74 op=UNLOAD Feb 12 19:40:24.857000 audit: BPF prog-id=73 op=UNLOAD Feb 12 19:40:24.857000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:24.857000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:24.857000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:24.857000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:24.857000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:24.857000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:24.857000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:24.857000 audit[2072]: AVC avc: denied { perfmon } for pid=2072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:24.857000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:24.857000 audit[2072]: AVC avc: denied { bpf } for pid=2072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:24.857000 audit: BPF prog-id=75 op=LOAD Feb 12 19:40:24.857000 audit[2072]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1987 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:24.857000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263633938616432376662396537366364363464656166313133623238 Feb 12 19:40:24.987000 audit: BPF prog-id=75 op=UNLOAD Feb 12 19:40:25.049654 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-2cc98ad27fb9e76cd64deaf113b28d3df127d7a29fb96624ff65b2ca2cf97333-rootfs.mount: Deactivated successfully. Feb 12 19:40:25.082790 kubelet[1901]: E0212 19:40:25.082705 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:25.142941 env[1347]: time="2024-02-12T19:40:25.142883978Z" level=info msg="shim disconnected" id=2cc98ad27fb9e76cd64deaf113b28d3df127d7a29fb96624ff65b2ca2cf97333 Feb 12 19:40:25.143091 env[1347]: time="2024-02-12T19:40:25.142935978Z" level=warning msg="cleaning up after shim disconnected" id=2cc98ad27fb9e76cd64deaf113b28d3df127d7a29fb96624ff65b2ca2cf97333 namespace=k8s.io Feb 12 19:40:25.143091 env[1347]: time="2024-02-12T19:40:25.142959538Z" level=info msg="cleaning up dead shim" Feb 12 19:40:25.149570 env[1347]: time="2024-02-12T19:40:25.149522718Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:40:25Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2109 runtime=io.containerd.runc.v2\n" Feb 12 19:40:25.200975 kubelet[1901]: E0212 19:40:25.200604 1901 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xlm9b" podUID="5067e866-4534-40f4-9993-6dcb1c81e037" Feb 12 19:40:26.083559 kubelet[1901]: E0212 19:40:26.083514 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:26.394525 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2331103496.mount: Deactivated successfully. Feb 12 19:40:26.845482 env[1347]: time="2024-02-12T19:40:26.845438624Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:26.852716 env[1347]: time="2024-02-12T19:40:26.852677321Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2d8b4f784b5f439fa536676861ad1144130a981e5ac011d08829ed921477ec74,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:26.856494 env[1347]: time="2024-02-12T19:40:26.856455310Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:26.859668 env[1347]: time="2024-02-12T19:40:26.859630220Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:3898a1671ae42be1cd3c2e777549bc7b5b306b8da3a224b747365f6679fb902a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:26.859957 env[1347]: time="2024-02-12T19:40:26.859926819Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\" returns image reference \"sha256:2d8b4f784b5f439fa536676861ad1144130a981e5ac011d08829ed921477ec74\"" Feb 12 19:40:26.861321 env[1347]: time="2024-02-12T19:40:26.861287295Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 12 19:40:26.862931 env[1347]: time="2024-02-12T19:40:26.862899090Z" level=info msg="CreateContainer within sandbox \"4ac4c223e757d07a610cc08ee2bae7f4afe22618261db7891dd3ada1f9142a6d\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 12 19:40:26.892858 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3201129425.mount: Deactivated successfully. Feb 12 19:40:26.907950 env[1347]: time="2024-02-12T19:40:26.907891513Z" level=info msg="CreateContainer within sandbox \"4ac4c223e757d07a610cc08ee2bae7f4afe22618261db7891dd3ada1f9142a6d\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"2318c2f81c0e9407dfd538ffb0b5ad7829dcf587d2eab9d1fa0bd5531b590fc8\"" Feb 12 19:40:26.908472 env[1347]: time="2024-02-12T19:40:26.908424151Z" level=info msg="StartContainer for \"2318c2f81c0e9407dfd538ffb0b5ad7829dcf587d2eab9d1fa0bd5531b590fc8\"" Feb 12 19:40:26.922442 systemd[1]: Started cri-containerd-2318c2f81c0e9407dfd538ffb0b5ad7829dcf587d2eab9d1fa0bd5531b590fc8.scope. Feb 12 19:40:26.936000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.936000 audit[2132]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2014 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:26.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233313863326638316330653934303764666435333866666230623561 Feb 12 19:40:26.936000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.936000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.936000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.936000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.936000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.936000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.936000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.936000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.936000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.936000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.936000 audit: BPF prog-id=76 op=LOAD Feb 12 19:40:26.936000 audit[2132]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2014 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:26.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233313863326638316330653934303764666435333866666230623561 Feb 12 19:40:26.936000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.936000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.936000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.936000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.936000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.936000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.936000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.936000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.936000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.936000 audit: BPF prog-id=77 op=LOAD Feb 12 19:40:26.936000 audit[2132]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2014 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:26.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233313863326638316330653934303764666435333866666230623561 Feb 12 19:40:26.936000 audit: BPF prog-id=77 op=UNLOAD Feb 12 19:40:26.936000 audit: BPF prog-id=76 op=UNLOAD Feb 12 19:40:26.936000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.936000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.936000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.936000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.936000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.936000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.936000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.936000 audit[2132]: AVC avc: denied { perfmon } for pid=2132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.936000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.936000 audit[2132]: AVC avc: denied { bpf } for pid=2132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:26.936000 audit: BPF prog-id=78 op=LOAD Feb 12 19:40:26.936000 audit[2132]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2014 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:26.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233313863326638316330653934303764666435333866666230623561 Feb 12 19:40:26.956215 env[1347]: time="2024-02-12T19:40:26.956150725Z" level=info msg="StartContainer for \"2318c2f81c0e9407dfd538ffb0b5ad7829dcf587d2eab9d1fa0bd5531b590fc8\" returns successfully" Feb 12 19:40:27.008000 audit[2183]: NETFILTER_CFG table=mangle:17 family=2 entries=1 op=nft_register_chain pid=2183 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.008000 audit[2183]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffcf22c30 a2=0 a3=ffff955c66c0 items=0 ppid=2143 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.008000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 19:40:27.009000 audit[2182]: NETFILTER_CFG table=mangle:18 family=10 entries=1 op=nft_register_chain pid=2182 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.009000 audit[2182]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd9f53730 a2=0 a3=ffffa9f826c0 items=0 ppid=2143 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.009000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 19:40:27.011000 audit[2184]: NETFILTER_CFG table=nat:19 family=2 entries=1 op=nft_register_chain pid=2184 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.011000 audit[2184]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffea6f7bf0 a2=0 a3=ffffa80af6c0 items=0 ppid=2143 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.011000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 19:40:27.012000 audit[2186]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_chain pid=2186 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.012000 audit[2186]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffef6a5bc0 a2=0 a3=ffff8b1ef6c0 items=0 ppid=2143 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.012000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 19:40:27.012000 audit[2185]: NETFILTER_CFG table=nat:21 family=10 entries=1 op=nft_register_chain pid=2185 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.012000 audit[2185]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc2868840 a2=0 a3=ffffaea3b6c0 items=0 ppid=2143 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.012000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 19:40:27.013000 audit[2189]: NETFILTER_CFG table=filter:22 family=10 entries=1 op=nft_register_chain pid=2189 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.013000 audit[2189]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff2009f10 a2=0 a3=ffff9c6946c0 items=0 ppid=2143 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.013000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 19:40:27.077363 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount737423674.mount: Deactivated successfully. Feb 12 19:40:27.083930 kubelet[1901]: E0212 19:40:27.083879 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:27.108000 audit[2190]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_chain pid=2190 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.108000 audit[2190]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc3d6e080 a2=0 a3=ffffb97e16c0 items=0 ppid=2143 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.108000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 19:40:27.113000 audit[2192]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=2192 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.113000 audit[2192]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffda309ff0 a2=0 a3=ffff874a46c0 items=0 ppid=2143 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.113000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 12 19:40:27.116000 audit[2195]: NETFILTER_CFG table=filter:25 family=2 entries=2 op=nft_register_chain pid=2195 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.116000 audit[2195]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc01277d0 a2=0 a3=ffff9135b6c0 items=0 ppid=2143 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.116000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 12 19:40:27.117000 audit[2196]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_chain pid=2196 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.117000 audit[2196]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe608fd70 a2=0 a3=ffffa7ce56c0 items=0 ppid=2143 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.117000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 19:40:27.119000 audit[2198]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=2198 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.119000 audit[2198]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff0e4a900 a2=0 a3=ffff8d3746c0 items=0 ppid=2143 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.119000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 19:40:27.120000 audit[2199]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_chain pid=2199 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.120000 audit[2199]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffff042450 a2=0 a3=ffffb1c156c0 items=0 ppid=2143 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.120000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 19:40:27.123000 audit[2201]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=2201 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.123000 audit[2201]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe01016a0 a2=0 a3=ffff91af26c0 items=0 ppid=2143 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.123000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 19:40:27.126000 audit[2204]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2204 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.126000 audit[2204]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff6571080 a2=0 a3=ffffa81f16c0 items=0 ppid=2143 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.126000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 12 19:40:27.127000 audit[2205]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_chain pid=2205 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.127000 audit[2205]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdb5385e0 a2=0 a3=ffffaf66a6c0 items=0 ppid=2143 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.127000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 19:40:27.129000 audit[2207]: NETFILTER_CFG table=filter:32 family=2 entries=1 op=nft_register_rule pid=2207 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.129000 audit[2207]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd73f76f0 a2=0 a3=ffffab1486c0 items=0 ppid=2143 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.129000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 19:40:27.130000 audit[2208]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_chain pid=2208 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.130000 audit[2208]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc826eee0 a2=0 a3=ffffb5a3e6c0 items=0 ppid=2143 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.130000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 19:40:27.132000 audit[2210]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2210 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.132000 audit[2210]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffcf1469e0 a2=0 a3=ffffaedf86c0 items=0 ppid=2143 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.132000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:40:27.135000 audit[2213]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_rule pid=2213 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.135000 audit[2213]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffffc5f210 a2=0 a3=ffff8739c6c0 items=0 ppid=2143 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.135000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:40:27.139000 audit[2216]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2216 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.139000 audit[2216]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd38839f0 a2=0 a3=ffff830e76c0 items=0 ppid=2143 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.139000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 19:40:27.140000 audit[2217]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2217 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.140000 audit[2217]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd8b083d0 a2=0 a3=ffff92d706c0 items=0 ppid=2143 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.140000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 19:40:27.142000 audit[2219]: NETFILTER_CFG table=nat:38 family=2 entries=2 op=nft_register_chain pid=2219 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.142000 audit[2219]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffe4d37660 a2=0 a3=ffffbd74c6c0 items=0 ppid=2143 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.142000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:40:27.174000 audit[2224]: NETFILTER_CFG table=nat:39 family=2 entries=2 op=nft_register_chain pid=2224 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.174000 audit[2224]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffe8b4d150 a2=0 a3=ffff945eb6c0 items=0 ppid=2143 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.174000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:40:27.175000 audit[2225]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2225 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.175000 audit[2225]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe0036a20 a2=0 a3=ffffbabd56c0 items=0 ppid=2143 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.175000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:40:27.178000 audit[2227]: NETFILTER_CFG table=nat:41 family=2 entries=2 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:27.178000 audit[2227]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffeba67580 a2=0 a3=ffff8399c6c0 items=0 ppid=2143 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.178000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:40:27.201315 kubelet[1901]: E0212 19:40:27.200948 1901 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xlm9b" podUID="5067e866-4534-40f4-9993-6dcb1c81e037" Feb 12 19:40:27.212000 audit[2233]: NETFILTER_CFG table=filter:42 family=2 entries=5 op=nft_register_rule pid=2233 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:40:27.212000 audit[2233]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffdeabb700 a2=0 a3=ffff92b9f6c0 items=0 ppid=2143 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.212000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:40:27.286000 audit[2233]: NETFILTER_CFG table=nat:43 family=2 entries=65 op=nft_register_chain pid=2233 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:40:27.286000 audit[2233]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30372 a0=3 a1=ffffdeabb700 a2=0 a3=ffff92b9f6c0 items=0 ppid=2143 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.286000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:40:27.315000 audit[2241]: NETFILTER_CFG table=filter:44 family=10 entries=1 op=nft_register_chain pid=2241 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.315000 audit[2241]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff3338970 a2=0 a3=ffff80ea96c0 items=0 ppid=2143 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.315000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 19:40:27.317000 audit[2243]: NETFILTER_CFG table=filter:45 family=10 entries=2 op=nft_register_chain pid=2243 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.317000 audit[2243]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff9475640 a2=0 a3=ffff9a2d96c0 items=0 ppid=2143 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.317000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 12 19:40:27.320000 audit[2246]: NETFILTER_CFG table=filter:46 family=10 entries=2 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.320000 audit[2246]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc4dcd2d0 a2=0 a3=ffffa6b476c0 items=0 ppid=2143 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.320000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 12 19:40:27.321000 audit[2247]: NETFILTER_CFG table=filter:47 family=10 entries=1 op=nft_register_chain pid=2247 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.321000 audit[2247]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc06a19e0 a2=0 a3=ffffb6efa6c0 items=0 ppid=2143 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.321000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 19:40:27.324000 audit[2249]: NETFILTER_CFG table=filter:48 family=10 entries=1 op=nft_register_rule pid=2249 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.324000 audit[2249]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc4035670 a2=0 a3=ffffad3e66c0 items=0 ppid=2143 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.324000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 19:40:27.325000 audit[2250]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2250 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.325000 audit[2250]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcf9acc90 a2=0 a3=ffff871db6c0 items=0 ppid=2143 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.325000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 19:40:27.327000 audit[2252]: NETFILTER_CFG table=filter:50 family=10 entries=1 op=nft_register_rule pid=2252 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.327000 audit[2252]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd19c0fa0 a2=0 a3=ffffa7dbe6c0 items=0 ppid=2143 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.327000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 12 19:40:27.331000 audit[2255]: NETFILTER_CFG table=filter:51 family=10 entries=2 op=nft_register_chain pid=2255 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.331000 audit[2255]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffce569cc0 a2=0 a3=ffff84cd36c0 items=0 ppid=2143 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.331000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 19:40:27.332000 audit[2256]: NETFILTER_CFG table=filter:52 family=10 entries=1 op=nft_register_chain pid=2256 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.332000 audit[2256]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe0a5a770 a2=0 a3=ffff8f2ae6c0 items=0 ppid=2143 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.332000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 19:40:27.335000 audit[2258]: NETFILTER_CFG table=filter:53 family=10 entries=1 op=nft_register_rule pid=2258 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.335000 audit[2258]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc4b408a0 a2=0 a3=ffff80ad76c0 items=0 ppid=2143 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.335000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 19:40:27.336000 audit[2259]: NETFILTER_CFG table=filter:54 family=10 entries=1 op=nft_register_chain pid=2259 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.336000 audit[2259]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffb752480 a2=0 a3=ffff8d9566c0 items=0 ppid=2143 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.336000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 19:40:27.338000 audit[2261]: NETFILTER_CFG table=filter:55 family=10 entries=1 op=nft_register_rule pid=2261 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.338000 audit[2261]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe470b640 a2=0 a3=ffffbe3ff6c0 items=0 ppid=2143 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.338000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:40:27.341000 audit[2264]: NETFILTER_CFG table=filter:56 family=10 entries=1 op=nft_register_rule pid=2264 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.341000 audit[2264]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe5ea8fb0 a2=0 a3=ffff8b12d6c0 items=0 ppid=2143 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.341000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 19:40:27.345000 audit[2267]: NETFILTER_CFG table=filter:57 family=10 entries=1 op=nft_register_rule pid=2267 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.345000 audit[2267]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd6d79d30 a2=0 a3=ffffb21b86c0 items=0 ppid=2143 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.345000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 12 19:40:27.346000 audit[2268]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.346000 audit[2268]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffdee9c710 a2=0 a3=ffff939556c0 items=0 ppid=2143 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.346000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 19:40:27.349000 audit[2270]: NETFILTER_CFG table=nat:59 family=10 entries=2 op=nft_register_chain pid=2270 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.349000 audit[2270]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffff398bac0 a2=0 a3=ffff9f5ed6c0 items=0 ppid=2143 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.349000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:40:27.352000 audit[2273]: NETFILTER_CFG table=nat:60 family=10 entries=2 op=nft_register_chain pid=2273 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.352000 audit[2273]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffe238afd0 a2=0 a3=ffff881466c0 items=0 ppid=2143 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.352000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:40:27.353000 audit[2274]: NETFILTER_CFG table=nat:61 family=10 entries=1 op=nft_register_chain pid=2274 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.353000 audit[2274]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffea1e1ef0 a2=0 a3=ffff860796c0 items=0 ppid=2143 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.353000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:40:27.356000 audit[2276]: NETFILTER_CFG table=nat:62 family=10 entries=2 op=nft_register_chain pid=2276 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.356000 audit[2276]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffd5b26880 a2=0 a3=ffff850176c0 items=0 ppid=2143 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.356000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:40:27.357000 audit[2277]: NETFILTER_CFG table=filter:63 family=10 entries=1 op=nft_register_chain pid=2277 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.357000 audit[2277]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff7e0fcc0 a2=0 a3=ffff974586c0 items=0 ppid=2143 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.357000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:40:27.359000 audit[2279]: NETFILTER_CFG table=filter:64 family=10 entries=1 op=nft_register_rule pid=2279 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.359000 audit[2279]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffffee6b0 a2=0 a3=ffffbbedd6c0 items=0 ppid=2143 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.359000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:40:27.364000 audit[2282]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_rule pid=2282 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:27.364000 audit[2282]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff71564c0 a2=0 a3=ffffa5fa46c0 items=0 ppid=2143 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.364000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:40:27.366000 audit[2284]: NETFILTER_CFG table=filter:66 family=10 entries=3 op=nft_register_rule pid=2284 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 19:40:27.366000 audit[2284]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffeb024450 a2=0 a3=ffffbb6d16c0 items=0 ppid=2143 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.366000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:40:27.367000 audit[2284]: NETFILTER_CFG table=nat:67 family=10 entries=7 op=nft_register_chain pid=2284 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 19:40:27.367000 audit[2284]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1968 a0=3 a1=ffffeb024450 a2=0 a3=ffffbb6d16c0 items=0 ppid=2143 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.367000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:40:28.084209 kubelet[1901]: E0212 19:40:28.084155 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:28.305927 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1585744164.mount: Deactivated successfully. Feb 12 19:40:29.085249 kubelet[1901]: E0212 19:40:29.085201 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:29.200526 kubelet[1901]: E0212 19:40:29.200501 1901 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xlm9b" podUID="5067e866-4534-40f4-9993-6dcb1c81e037" Feb 12 19:40:30.085948 kubelet[1901]: E0212 19:40:30.085876 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:31.086119 kubelet[1901]: E0212 19:40:31.086074 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:31.201832 kubelet[1901]: E0212 19:40:31.201091 1901 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xlm9b" podUID="5067e866-4534-40f4-9993-6dcb1c81e037" Feb 12 19:40:31.749379 env[1347]: time="2024-02-12T19:40:31.749333109Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:31.757666 env[1347]: time="2024-02-12T19:40:31.757617327Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:31.762251 env[1347]: time="2024-02-12T19:40:31.762212755Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:31.765882 env[1347]: time="2024-02-12T19:40:31.765852465Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:31.766418 env[1347]: time="2024-02-12T19:40:31.766387784Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b\"" Feb 12 19:40:31.768622 env[1347]: time="2024-02-12T19:40:31.768593378Z" level=info msg="CreateContainer within sandbox \"356975c0cd33158531687cd142f10f185fc59a4abf98939d33008fbcccff49c4\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 12 19:40:31.792427 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3108423100.mount: Deactivated successfully. Feb 12 19:40:31.808635 env[1347]: time="2024-02-12T19:40:31.808586031Z" level=info msg="CreateContainer within sandbox \"356975c0cd33158531687cd142f10f185fc59a4abf98939d33008fbcccff49c4\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"a16368216ac2ddec50b6e916262c7f6af505954506e9623d91ccb14c571c66a8\"" Feb 12 19:40:31.809109 env[1347]: time="2024-02-12T19:40:31.809083949Z" level=info msg="StartContainer for \"a16368216ac2ddec50b6e916262c7f6af505954506e9623d91ccb14c571c66a8\"" Feb 12 19:40:31.826107 systemd[1]: Started cri-containerd-a16368216ac2ddec50b6e916262c7f6af505954506e9623d91ccb14c571c66a8.scope. Feb 12 19:40:31.829060 systemd[1]: run-containerd-runc-k8s.io-a16368216ac2ddec50b6e916262c7f6af505954506e9623d91ccb14c571c66a8-runc.MRamxn.mount: Deactivated successfully. Feb 12 19:40:31.868861 kernel: kauditd_printk_skb: 230 callbacks suppressed Feb 12 19:40:31.868984 kernel: audit: type=1400 audit(1707766831.844:629): avc: denied { perfmon } for pid=2292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:31.844000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:31.844000 audit[2292]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1987 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:31.895959 kernel: audit: type=1300 audit(1707766831.844:629): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=1987 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:31.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131363336383231366163326464656335306236653931363236326337 Feb 12 19:40:31.920186 kernel: audit: type=1327 audit(1707766831.844:629): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131363336383231366163326464656335306236653931363236326337 Feb 12 19:40:31.844000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:31.937223 kernel: audit: type=1400 audit(1707766831.844:630): avc: denied { bpf } for pid=2292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:31.844000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:31.844000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:31.972392 kernel: audit: type=1400 audit(1707766831.844:630): avc: denied { bpf } for pid=2292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:31.972473 kernel: audit: type=1400 audit(1707766831.844:630): avc: denied { bpf } for pid=2292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:31.844000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:31.990405 kernel: audit: type=1400 audit(1707766831.844:630): avc: denied { perfmon } for pid=2292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:31.844000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.010394 env[1347]: time="2024-02-12T19:40:31.997027127Z" level=info msg="StartContainer for \"a16368216ac2ddec50b6e916262c7f6af505954506e9623d91ccb14c571c66a8\" returns successfully" Feb 12 19:40:31.844000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.012763 kernel: audit: type=1400 audit(1707766831.844:630): avc: denied { perfmon } for pid=2292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:31.844000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.048408 kernel: audit: type=1400 audit(1707766831.844:630): avc: denied { perfmon } for pid=2292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.048478 kernel: audit: type=1400 audit(1707766831.844:630): avc: denied { perfmon } for pid=2292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:31.844000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:31.844000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:31.844000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:31.844000 audit: BPF prog-id=79 op=LOAD Feb 12 19:40:31.844000 audit[2292]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=1987 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:31.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131363336383231366163326464656335306236653931363236326337 Feb 12 19:40:31.851000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:31.851000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:31.851000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:31.851000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:31.851000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:31.851000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:31.851000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:31.851000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:31.851000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:31.851000 audit: BPF prog-id=80 op=LOAD Feb 12 19:40:31.851000 audit[2292]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=1987 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:31.851000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131363336383231366163326464656335306236653931363236326337 Feb 12 19:40:31.867000 audit: BPF prog-id=80 op=UNLOAD Feb 12 19:40:31.867000 audit: BPF prog-id=79 op=UNLOAD Feb 12 19:40:31.867000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:31.867000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:31.867000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:31.867000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:31.867000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:31.867000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:31.867000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:31.867000 audit[2292]: AVC avc: denied { perfmon } for pid=2292 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:31.867000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:31.867000 audit[2292]: AVC avc: denied { bpf } for pid=2292 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:31.867000 audit: BPF prog-id=81 op=LOAD Feb 12 19:40:31.867000 audit[2292]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=1987 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:31.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131363336383231366163326464656335306236653931363236326337 Feb 12 19:40:32.086236 kubelet[1901]: E0212 19:40:32.086175 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:32.243978 kubelet[1901]: I0212 19:40:32.243926 1901 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-sxfwd" podStartSLOduration=8.464687165 podCreationTimestamp="2024-02-12 19:40:20 +0000 UTC" firstStartedPulling="2024-02-12 19:40:23.08121518 +0000 UTC m=+4.467281929" lastFinishedPulling="2024-02-12 19:40:26.860325098 +0000 UTC m=+8.246391887" observedRunningTime="2024-02-12 19:40:27.261698013 +0000 UTC m=+8.647764802" watchObservedRunningTime="2024-02-12 19:40:32.243797123 +0000 UTC m=+13.629863912" Feb 12 19:40:33.086992 kubelet[1901]: E0212 19:40:33.086959 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:33.201157 kubelet[1901]: E0212 19:40:33.201114 1901 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xlm9b" podUID="5067e866-4534-40f4-9993-6dcb1c81e037" Feb 12 19:40:33.305035 systemd[1]: cri-containerd-a16368216ac2ddec50b6e916262c7f6af505954506e9623d91ccb14c571c66a8.scope: Deactivated successfully. Feb 12 19:40:33.321600 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a16368216ac2ddec50b6e916262c7f6af505954506e9623d91ccb14c571c66a8-rootfs.mount: Deactivated successfully. Feb 12 19:40:33.321000 audit: BPF prog-id=81 op=UNLOAD Feb 12 19:40:33.377774 kubelet[1901]: I0212 19:40:33.377656 1901 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 12 19:40:34.087444 kubelet[1901]: E0212 19:40:34.087402 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:34.934870 env[1347]: time="2024-02-12T19:40:34.934814582Z" level=info msg="shim disconnected" id=a16368216ac2ddec50b6e916262c7f6af505954506e9623d91ccb14c571c66a8 Feb 12 19:40:34.935288 env[1347]: time="2024-02-12T19:40:34.935267581Z" level=warning msg="cleaning up after shim disconnected" id=a16368216ac2ddec50b6e916262c7f6af505954506e9623d91ccb14c571c66a8 namespace=k8s.io Feb 12 19:40:34.935357 env[1347]: time="2024-02-12T19:40:34.935344780Z" level=info msg="cleaning up dead shim" Feb 12 19:40:34.942280 env[1347]: time="2024-02-12T19:40:34.942244123Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:40:34Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2339 runtime=io.containerd.runc.v2\n" Feb 12 19:40:35.087720 kubelet[1901]: E0212 19:40:35.087684 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:35.206134 systemd[1]: Created slice kubepods-besteffort-pod5067e866_4534_40f4_9993_6dcb1c81e037.slice. Feb 12 19:40:35.209112 env[1347]: time="2024-02-12T19:40:35.209079436Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xlm9b,Uid:5067e866-4534-40f4-9993-6dcb1c81e037,Namespace:calico-system,Attempt:0,}" Feb 12 19:40:35.242023 env[1347]: time="2024-02-12T19:40:35.241902117Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 12 19:40:35.285307 env[1347]: time="2024-02-12T19:40:35.285228333Z" level=error msg="Failed to destroy network for sandbox \"7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:40:35.286480 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29-shm.mount: Deactivated successfully. Feb 12 19:40:35.288360 env[1347]: time="2024-02-12T19:40:35.287451447Z" level=error msg="encountered an error cleaning up failed sandbox \"7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:40:35.288360 env[1347]: time="2024-02-12T19:40:35.287514647Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xlm9b,Uid:5067e866-4534-40f4-9993-6dcb1c81e037,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:40:35.288467 kubelet[1901]: E0212 19:40:35.287754 1901 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:40:35.288467 kubelet[1901]: E0212 19:40:35.287806 1901 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xlm9b" Feb 12 19:40:35.288467 kubelet[1901]: E0212 19:40:35.287824 1901 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xlm9b" Feb 12 19:40:35.288553 kubelet[1901]: E0212 19:40:35.287917 1901 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-xlm9b_calico-system(5067e866-4534-40f4-9993-6dcb1c81e037)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-xlm9b_calico-system(5067e866-4534-40f4-9993-6dcb1c81e037)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xlm9b" podUID="5067e866-4534-40f4-9993-6dcb1c81e037" Feb 12 19:40:35.288553 kubelet[1901]: I0212 19:40:35.288479 1901 topology_manager.go:215] "Topology Admit Handler" podUID="dfd4dd87-ec69-4e3d-99ec-24f4279ddff1" podNamespace="default" podName="nginx-deployment-6d5f899847-m94l7" Feb 12 19:40:35.292947 systemd[1]: Created slice kubepods-besteffort-poddfd4dd87_ec69_4e3d_99ec_24f4279ddff1.slice. Feb 12 19:40:35.385064 kubelet[1901]: I0212 19:40:35.385036 1901 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5zvg7\" (UniqueName: \"kubernetes.io/projected/dfd4dd87-ec69-4e3d-99ec-24f4279ddff1-kube-api-access-5zvg7\") pod \"nginx-deployment-6d5f899847-m94l7\" (UID: \"dfd4dd87-ec69-4e3d-99ec-24f4279ddff1\") " pod="default/nginx-deployment-6d5f899847-m94l7" Feb 12 19:40:35.595889 env[1347]: time="2024-02-12T19:40:35.595852104Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-m94l7,Uid:dfd4dd87-ec69-4e3d-99ec-24f4279ddff1,Namespace:default,Attempt:0,}" Feb 12 19:40:35.691958 env[1347]: time="2024-02-12T19:40:35.691907273Z" level=error msg="Failed to destroy network for sandbox \"8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:40:35.692414 env[1347]: time="2024-02-12T19:40:35.692384631Z" level=error msg="encountered an error cleaning up failed sandbox \"8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:40:35.692533 env[1347]: time="2024-02-12T19:40:35.692507831Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-m94l7,Uid:dfd4dd87-ec69-4e3d-99ec-24f4279ddff1,Namespace:default,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:40:35.692843 kubelet[1901]: E0212 19:40:35.692817 1901 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:40:35.692922 kubelet[1901]: E0212 19:40:35.692874 1901 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-m94l7" Feb 12 19:40:35.692922 kubelet[1901]: E0212 19:40:35.692896 1901 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="default/nginx-deployment-6d5f899847-m94l7" Feb 12 19:40:35.692975 kubelet[1901]: E0212 19:40:35.692940 1901 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"nginx-deployment-6d5f899847-m94l7_default(dfd4dd87-ec69-4e3d-99ec-24f4279ddff1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"nginx-deployment-6d5f899847-m94l7_default(dfd4dd87-ec69-4e3d-99ec-24f4279ddff1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-m94l7" podUID="dfd4dd87-ec69-4e3d-99ec-24f4279ddff1" Feb 12 19:40:36.088917 kubelet[1901]: E0212 19:40:36.088329 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:36.237157 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621-shm.mount: Deactivated successfully. Feb 12 19:40:36.239770 kubelet[1901]: I0212 19:40:36.239395 1901 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29" Feb 12 19:40:36.240170 env[1347]: time="2024-02-12T19:40:36.240134085Z" level=info msg="StopPodSandbox for \"7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29\"" Feb 12 19:40:36.241519 kubelet[1901]: I0212 19:40:36.241493 1901 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621" Feb 12 19:40:36.241922 env[1347]: time="2024-02-12T19:40:36.241886321Z" level=info msg="StopPodSandbox for \"8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621\"" Feb 12 19:40:36.266297 env[1347]: time="2024-02-12T19:40:36.266231184Z" level=error msg="StopPodSandbox for \"7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29\" failed" error="failed to destroy network for sandbox \"7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:40:36.266529 kubelet[1901]: E0212 19:40:36.266503 1901 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29" Feb 12 19:40:36.266588 kubelet[1901]: E0212 19:40:36.266577 1901 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29"} Feb 12 19:40:36.266629 kubelet[1901]: E0212 19:40:36.266612 1901 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5067e866-4534-40f4-9993-6dcb1c81e037\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:40:36.266702 kubelet[1901]: E0212 19:40:36.266649 1901 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5067e866-4534-40f4-9993-6dcb1c81e037\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xlm9b" podUID="5067e866-4534-40f4-9993-6dcb1c81e037" Feb 12 19:40:36.271966 env[1347]: time="2024-02-12T19:40:36.271915811Z" level=error msg="StopPodSandbox for \"8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621\" failed" error="failed to destroy network for sandbox \"8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:40:36.272170 kubelet[1901]: E0212 19:40:36.272148 1901 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621" Feb 12 19:40:36.272221 kubelet[1901]: E0212 19:40:36.272190 1901 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621"} Feb 12 19:40:36.272256 kubelet[1901]: E0212 19:40:36.272225 1901 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"dfd4dd87-ec69-4e3d-99ec-24f4279ddff1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:40:36.272295 kubelet[1901]: E0212 19:40:36.272271 1901 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"dfd4dd87-ec69-4e3d-99ec-24f4279ddff1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="default/nginx-deployment-6d5f899847-m94l7" podUID="dfd4dd87-ec69-4e3d-99ec-24f4279ddff1" Feb 12 19:40:37.088593 kubelet[1901]: E0212 19:40:37.088549 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:38.089458 kubelet[1901]: E0212 19:40:38.089422 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:39.079389 kubelet[1901]: E0212 19:40:39.079345 1901 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:39.090499 kubelet[1901]: E0212 19:40:39.090473 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:40.090716 kubelet[1901]: E0212 19:40:40.090682 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:41.091202 kubelet[1901]: E0212 19:40:41.091148 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:42.091441 kubelet[1901]: E0212 19:40:42.091404 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:42.269492 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3916772283.mount: Deactivated successfully. Feb 12 19:40:42.426267 env[1347]: time="2024-02-12T19:40:42.426221778Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:42.432927 env[1347]: time="2024-02-12T19:40:42.432878765Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:42.439244 env[1347]: time="2024-02-12T19:40:42.439195552Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:42.441531 env[1347]: time="2024-02-12T19:40:42.441497707Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:42.442062 env[1347]: time="2024-02-12T19:40:42.442034066Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774\"" Feb 12 19:40:42.455637 env[1347]: time="2024-02-12T19:40:42.455594839Z" level=info msg="CreateContainer within sandbox \"356975c0cd33158531687cd142f10f185fc59a4abf98939d33008fbcccff49c4\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 12 19:40:42.485293 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2369104220.mount: Deactivated successfully. Feb 12 19:40:42.502348 env[1347]: time="2024-02-12T19:40:42.502304184Z" level=info msg="CreateContainer within sandbox \"356975c0cd33158531687cd142f10f185fc59a4abf98939d33008fbcccff49c4\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"660f1f1367f6b3bc7298080bc1c9a1c3390560fcc89fd5189c0f999e88084abb\"" Feb 12 19:40:42.503174 env[1347]: time="2024-02-12T19:40:42.503140783Z" level=info msg="StartContainer for \"660f1f1367f6b3bc7298080bc1c9a1c3390560fcc89fd5189c0f999e88084abb\"" Feb 12 19:40:42.516947 systemd[1]: Started cri-containerd-660f1f1367f6b3bc7298080bc1c9a1c3390560fcc89fd5189c0f999e88084abb.scope. Feb 12 19:40:42.532000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:42.539167 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 12 19:40:42.539258 kernel: audit: type=1400 audit(1707766842.532:636): avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:42.532000 audit[2463]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=1987 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:42.582400 kernel: audit: type=1300 audit(1707766842.532:636): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=1987 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:42.532000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636306631663133363766366233626337323938303830626331633961 Feb 12 19:40:42.606728 kernel: audit: type=1327 audit(1707766842.532:636): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636306631663133363766366233626337323938303830626331633961 Feb 12 19:40:42.535000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:42.618760 env[1347]: time="2024-02-12T19:40:42.618697629Z" level=info msg="StartContainer for \"660f1f1367f6b3bc7298080bc1c9a1c3390560fcc89fd5189c0f999e88084abb\" returns successfully" Feb 12 19:40:42.624762 kernel: audit: type=1400 audit(1707766842.535:637): avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:42.535000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:42.642751 kernel: audit: type=1400 audit(1707766842.535:637): avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:42.642890 kernel: audit: type=1400 audit(1707766842.535:637): avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:42.535000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:42.535000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:42.676455 kernel: audit: type=1400 audit(1707766842.535:637): avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:42.535000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:42.694264 kernel: audit: type=1400 audit(1707766842.535:637): avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:42.694356 kernel: audit: type=1400 audit(1707766842.535:637): avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:42.535000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:42.535000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:42.727905 kernel: audit: type=1400 audit(1707766842.535:637): avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:42.535000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:42.535000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:42.535000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:42.535000 audit: BPF prog-id=82 op=LOAD Feb 12 19:40:42.535000 audit[2463]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=1987 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:42.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636306631663133363766366233626337323938303830626331633961 Feb 12 19:40:42.537000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:42.537000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:42.537000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:42.537000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:42.537000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:42.537000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:42.537000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:42.537000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:42.537000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:42.537000 audit: BPF prog-id=83 op=LOAD Feb 12 19:40:42.537000 audit[2463]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=1987 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:42.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636306631663133363766366233626337323938303830626331633961 Feb 12 19:40:42.554000 audit: BPF prog-id=83 op=UNLOAD Feb 12 19:40:42.554000 audit: BPF prog-id=82 op=UNLOAD Feb 12 19:40:42.554000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:42.554000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:42.554000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:42.554000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:42.554000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:42.554000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:42.554000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:42.554000 audit[2463]: AVC avc: denied { perfmon } for pid=2463 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:42.554000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:42.554000 audit[2463]: AVC avc: denied { bpf } for pid=2463 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:42.554000 audit: BPF prog-id=84 op=LOAD Feb 12 19:40:42.554000 audit[2463]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=1987 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:42.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636306631663133363766366233626337323938303830626331633961 Feb 12 19:40:42.872470 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 12 19:40:42.872603 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 12 19:40:43.092495 kubelet[1901]: E0212 19:40:43.092390 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:43.271484 kubelet[1901]: I0212 19:40:43.271277 1901 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-zjzkz" podStartSLOduration=3.887103673 podCreationTimestamp="2024-02-12 19:40:20 +0000 UTC" firstStartedPulling="2024-02-12 19:40:23.058174296 +0000 UTC m=+4.444241085" lastFinishedPulling="2024-02-12 19:40:42.442308826 +0000 UTC m=+23.828375615" observedRunningTime="2024-02-12 19:40:43.271110483 +0000 UTC m=+24.657177272" watchObservedRunningTime="2024-02-12 19:40:43.271238203 +0000 UTC m=+24.657304992" Feb 12 19:40:44.092724 kubelet[1901]: E0212 19:40:44.092685 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:44.126000 audit[2577]: AVC avc: denied { write } for pid=2577 comm="tee" name="fd" dev="proc" ino=17358 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:40:44.126000 audit[2577]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffce3ff96e a2=241 a3=1b6 items=1 ppid=2537 pid=2577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:44.126000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 12 19:40:44.126000 audit: PATH item=0 name="/dev/fd/63" inode=17348 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:40:44.126000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:40:44.130000 audit[2584]: AVC avc: denied { write } for pid=2584 comm="tee" name="fd" dev="proc" ino=17362 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:40:44.132000 audit[2579]: AVC avc: denied { write } for pid=2579 comm="tee" name="fd" dev="proc" ino=17915 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:40:44.132000 audit[2579]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe5c9396d a2=241 a3=1b6 items=1 ppid=2536 pid=2579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:44.132000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 12 19:40:44.132000 audit: PATH item=0 name="/dev/fd/63" inode=17351 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:40:44.132000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:40:44.134000 audit[2583]: AVC avc: denied { write } for pid=2583 comm="tee" name="fd" dev="proc" ino=17365 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:40:44.134000 audit[2587]: AVC avc: denied { write } for pid=2587 comm="tee" name="fd" dev="proc" ino=17368 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:40:44.130000 audit[2584]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe647f97d a2=241 a3=1b6 items=1 ppid=2539 pid=2584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:44.134000 audit[2583]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd03ee97d a2=241 a3=1b6 items=1 ppid=2533 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:44.130000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 12 19:40:44.130000 audit: PATH item=0 name="/dev/fd/63" inode=17354 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:40:44.130000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:40:44.134000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 12 19:40:44.134000 audit: PATH item=0 name="/dev/fd/63" inode=17909 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:40:44.134000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:40:44.134000 audit[2587]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffc48697f a2=241 a3=1b6 items=1 ppid=2540 pid=2587 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:44.134000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 12 19:40:44.134000 audit: PATH item=0 name="/dev/fd/63" inode=17355 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:40:44.134000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:40:44.140000 audit[2589]: AVC avc: denied { write } for pid=2589 comm="tee" name="fd" dev="proc" ino=17921 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:40:44.140000 audit[2589]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc77bd97d a2=241 a3=1b6 items=1 ppid=2532 pid=2589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:44.140000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 12 19:40:44.140000 audit: PATH item=0 name="/dev/fd/63" inode=17912 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:40:44.140000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:40:44.167000 audit[2596]: AVC avc: denied { write } for pid=2596 comm="tee" name="fd" dev="proc" ino=17926 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:40:44.167000 audit[2596]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd83c597e a2=241 a3=1b6 items=1 ppid=2529 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:44.167000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 12 19:40:44.167000 audit: PATH item=0 name="/dev/fd/63" inode=17923 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:40:44.167000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:40:44.379762 kernel: Initializing XFRM netlink socket Feb 12 19:40:44.523000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:44.523000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:44.523000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:44.523000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:44.523000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:44.523000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:44.523000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:44.523000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:44.523000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:44.523000 audit: BPF prog-id=85 op=LOAD Feb 12 19:40:44.523000 audit[2666]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff4aa9b68 a2=70 a3=0 items=0 ppid=2535 pid=2666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:44.523000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:40:44.524000 audit: BPF prog-id=85 op=UNLOAD Feb 12 19:40:44.524000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:44.524000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:44.524000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:44.524000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:44.524000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:44.524000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:44.524000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:44.524000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:44.524000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:44.524000 audit: BPF prog-id=86 op=LOAD Feb 12 19:40:44.524000 audit[2666]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff4aa9b68 a2=70 a3=4a174c items=0 ppid=2535 pid=2666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:44.524000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:40:44.524000 audit: BPF prog-id=86 op=UNLOAD Feb 12 19:40:44.524000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:44.524000 audit[2666]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=fffff4aa9b98 a2=70 a3=3157779f items=0 ppid=2535 pid=2666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:44.524000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:40:44.525000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:44.525000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:44.525000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:44.525000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:44.525000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:44.525000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:44.525000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:44.525000 audit[2666]: AVC avc: denied { perfmon } for pid=2666 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:44.525000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:44.525000 audit[2666]: AVC avc: denied { bpf } for pid=2666 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:44.525000 audit: BPF prog-id=87 op=LOAD Feb 12 19:40:44.525000 audit[2666]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=fffff4aa9ae8 a2=70 a3=315777b9 items=0 ppid=2535 pid=2666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:44.525000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:40:44.528000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:44.528000 audit[2668]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffde534298 a2=70 a3=0 items=0 ppid=2535 pid=2668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:44.528000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 19:40:44.529000 audit[2668]: AVC avc: denied { bpf } for pid=2668 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:44.529000 audit[2668]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffde534178 a2=70 a3=2 items=0 ppid=2535 pid=2668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:44.529000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 19:40:44.541000 audit: BPF prog-id=87 op=UNLOAD Feb 12 19:40:44.674000 audit[2694]: NETFILTER_CFG table=mangle:68 family=2 entries=19 op=nft_register_chain pid=2694 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:40:44.674000 audit[2694]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=ffffedf82d40 a2=0 a3=ffffbe450fa8 items=0 ppid=2535 pid=2694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:44.674000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:40:44.688000 audit[2691]: NETFILTER_CFG table=raw:69 family=2 entries=19 op=nft_register_chain pid=2691 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:40:44.688000 audit[2691]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=ffffd7ffb370 a2=0 a3=ffffa04c7fa8 items=0 ppid=2535 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:44.688000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:40:44.754000 audit[2693]: NETFILTER_CFG table=nat:70 family=2 entries=16 op=nft_register_chain pid=2693 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:40:44.754000 audit[2693]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=fffff99a3210 a2=0 a3=ffff9f76efa8 items=0 ppid=2535 pid=2693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:44.754000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:40:44.755000 audit[2692]: NETFILTER_CFG table=filter:71 family=2 entries=39 op=nft_register_chain pid=2692 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:40:44.755000 audit[2692]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18472 a0=3 a1=ffffc60b3e20 a2=0 a3=ffff89662fa8 items=0 ppid=2535 pid=2692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:44.755000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:40:45.093310 kubelet[1901]: E0212 19:40:45.093185 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:45.512177 systemd-networkd[1496]: vxlan.calico: Link UP Feb 12 19:40:45.512185 systemd-networkd[1496]: vxlan.calico: Gained carrier Feb 12 19:40:45.654576 kubelet[1901]: I0212 19:40:45.653659 1901 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Feb 12 19:40:45.668302 systemd[1]: run-containerd-runc-k8s.io-660f1f1367f6b3bc7298080bc1c9a1c3390560fcc89fd5189c0f999e88084abb-runc.QXwHCq.mount: Deactivated successfully. Feb 12 19:40:46.093866 kubelet[1901]: E0212 19:40:46.093803 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:46.664389 systemd[1]: run-containerd-runc-k8s.io-660f1f1367f6b3bc7298080bc1c9a1c3390560fcc89fd5189c0f999e88084abb-runc.uTvg7e.mount: Deactivated successfully. Feb 12 19:40:47.094710 kubelet[1901]: E0212 19:40:47.094585 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:47.526959 systemd-networkd[1496]: vxlan.calico: Gained IPv6LL Feb 12 19:40:48.285242 kubelet[1901]: E0212 19:40:48.094726 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:49.095507 kubelet[1901]: E0212 19:40:49.095470 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:49.204088 env[1347]: time="2024-02-12T19:40:49.204034469Z" level=info msg="StopPodSandbox for \"8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621\"" Feb 12 19:40:49.274225 env[1347]: 2024-02-12 19:40:49.244 [INFO][2770] k8s.go 578: Cleaning up netns ContainerID="8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621" Feb 12 19:40:49.274225 env[1347]: 2024-02-12 19:40:49.244 [INFO][2770] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621" iface="eth0" netns="/var/run/netns/cni-70845b99-ea86-4e13-e8b6-906ec4b69ed8" Feb 12 19:40:49.274225 env[1347]: 2024-02-12 19:40:49.244 [INFO][2770] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621" iface="eth0" netns="/var/run/netns/cni-70845b99-ea86-4e13-e8b6-906ec4b69ed8" Feb 12 19:40:49.274225 env[1347]: 2024-02-12 19:40:49.244 [INFO][2770] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621" iface="eth0" netns="/var/run/netns/cni-70845b99-ea86-4e13-e8b6-906ec4b69ed8" Feb 12 19:40:49.274225 env[1347]: 2024-02-12 19:40:49.244 [INFO][2770] k8s.go 585: Releasing IP address(es) ContainerID="8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621" Feb 12 19:40:49.274225 env[1347]: 2024-02-12 19:40:49.244 [INFO][2770] utils.go 188: Calico CNI releasing IP address ContainerID="8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621" Feb 12 19:40:49.274225 env[1347]: 2024-02-12 19:40:49.261 [INFO][2776] ipam_plugin.go 415: Releasing address using handleID ContainerID="8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621" HandleID="k8s-pod-network.8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621" Workload="10.200.20.12-k8s-nginx--deployment--6d5f899847--m94l7-eth0" Feb 12 19:40:49.274225 env[1347]: 2024-02-12 19:40:49.261 [INFO][2776] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:40:49.274225 env[1347]: 2024-02-12 19:40:49.261 [INFO][2776] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:40:49.274225 env[1347]: 2024-02-12 19:40:49.271 [WARNING][2776] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621" HandleID="k8s-pod-network.8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621" Workload="10.200.20.12-k8s-nginx--deployment--6d5f899847--m94l7-eth0" Feb 12 19:40:49.274225 env[1347]: 2024-02-12 19:40:49.271 [INFO][2776] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621" HandleID="k8s-pod-network.8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621" Workload="10.200.20.12-k8s-nginx--deployment--6d5f899847--m94l7-eth0" Feb 12 19:40:49.274225 env[1347]: 2024-02-12 19:40:49.272 [INFO][2776] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:40:49.274225 env[1347]: 2024-02-12 19:40:49.273 [INFO][2770] k8s.go 591: Teardown processing complete. ContainerID="8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621" Feb 12 19:40:49.276133 systemd[1]: run-netns-cni\x2d70845b99\x2dea86\x2d4e13\x2de8b6\x2d906ec4b69ed8.mount: Deactivated successfully. Feb 12 19:40:49.276996 env[1347]: time="2024-02-12T19:40:49.276958424Z" level=info msg="TearDown network for sandbox \"8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621\" successfully" Feb 12 19:40:49.277095 env[1347]: time="2024-02-12T19:40:49.277077544Z" level=info msg="StopPodSandbox for \"8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621\" returns successfully" Feb 12 19:40:49.277988 env[1347]: time="2024-02-12T19:40:49.277962903Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-m94l7,Uid:dfd4dd87-ec69-4e3d-99ec-24f4279ddff1,Namespace:default,Attempt:1,}" Feb 12 19:40:49.419082 systemd-networkd[1496]: calia3beb929c6e: Link UP Feb 12 19:40:49.432872 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:40:49.433026 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia3beb929c6e: link becomes ready Feb 12 19:40:49.433408 systemd-networkd[1496]: calia3beb929c6e: Gained carrier Feb 12 19:40:49.458268 env[1347]: 2024-02-12 19:40:49.359 [INFO][2782] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.12-k8s-nginx--deployment--6d5f899847--m94l7-eth0 nginx-deployment-6d5f899847- default dfd4dd87-ec69-4e3d-99ec-24f4279ddff1 1216 0 2024-02-12 19:40:35 +0000 UTC map[app:nginx pod-template-hash:6d5f899847 projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.12 nginx-deployment-6d5f899847-m94l7 eth0 default [] [] [kns.default ksa.default.default] calia3beb929c6e [] []}} ContainerID="84a559e2d0b8cfec088dc4bb3fa4cca002214e554282761058c744ec34e80e4b" Namespace="default" Pod="nginx-deployment-6d5f899847-m94l7" WorkloadEndpoint="10.200.20.12-k8s-nginx--deployment--6d5f899847--m94l7-" Feb 12 19:40:49.458268 env[1347]: 2024-02-12 19:40:49.360 [INFO][2782] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="84a559e2d0b8cfec088dc4bb3fa4cca002214e554282761058c744ec34e80e4b" Namespace="default" Pod="nginx-deployment-6d5f899847-m94l7" WorkloadEndpoint="10.200.20.12-k8s-nginx--deployment--6d5f899847--m94l7-eth0" Feb 12 19:40:49.458268 env[1347]: 2024-02-12 19:40:49.381 [INFO][2795] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="84a559e2d0b8cfec088dc4bb3fa4cca002214e554282761058c744ec34e80e4b" HandleID="k8s-pod-network.84a559e2d0b8cfec088dc4bb3fa4cca002214e554282761058c744ec34e80e4b" Workload="10.200.20.12-k8s-nginx--deployment--6d5f899847--m94l7-eth0" Feb 12 19:40:49.458268 env[1347]: 2024-02-12 19:40:49.393 [INFO][2795] ipam_plugin.go 268: Auto assigning IP ContainerID="84a559e2d0b8cfec088dc4bb3fa4cca002214e554282761058c744ec34e80e4b" HandleID="k8s-pod-network.84a559e2d0b8cfec088dc4bb3fa4cca002214e554282761058c744ec34e80e4b" Workload="10.200.20.12-k8s-nginx--deployment--6d5f899847--m94l7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400028f410), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.12", "pod":"nginx-deployment-6d5f899847-m94l7", "timestamp":"2024-02-12 19:40:49.381334206 +0000 UTC"}, Hostname:"10.200.20.12", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:40:49.458268 env[1347]: 2024-02-12 19:40:49.393 [INFO][2795] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:40:49.458268 env[1347]: 2024-02-12 19:40:49.393 [INFO][2795] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:40:49.458268 env[1347]: 2024-02-12 19:40:49.393 [INFO][2795] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.12' Feb 12 19:40:49.458268 env[1347]: 2024-02-12 19:40:49.395 [INFO][2795] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.84a559e2d0b8cfec088dc4bb3fa4cca002214e554282761058c744ec34e80e4b" host="10.200.20.12" Feb 12 19:40:49.458268 env[1347]: 2024-02-12 19:40:49.397 [INFO][2795] ipam.go 372: Looking up existing affinities for host host="10.200.20.12" Feb 12 19:40:49.458268 env[1347]: 2024-02-12 19:40:49.400 [INFO][2795] ipam.go 489: Trying affinity for 192.168.119.0/26 host="10.200.20.12" Feb 12 19:40:49.458268 env[1347]: 2024-02-12 19:40:49.402 [INFO][2795] ipam.go 155: Attempting to load block cidr=192.168.119.0/26 host="10.200.20.12" Feb 12 19:40:49.458268 env[1347]: 2024-02-12 19:40:49.404 [INFO][2795] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.119.0/26 host="10.200.20.12" Feb 12 19:40:49.458268 env[1347]: 2024-02-12 19:40:49.404 [INFO][2795] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.119.0/26 handle="k8s-pod-network.84a559e2d0b8cfec088dc4bb3fa4cca002214e554282761058c744ec34e80e4b" host="10.200.20.12" Feb 12 19:40:49.458268 env[1347]: 2024-02-12 19:40:49.406 [INFO][2795] ipam.go 1682: Creating new handle: k8s-pod-network.84a559e2d0b8cfec088dc4bb3fa4cca002214e554282761058c744ec34e80e4b Feb 12 19:40:49.458268 env[1347]: 2024-02-12 19:40:49.409 [INFO][2795] ipam.go 1203: Writing block in order to claim IPs block=192.168.119.0/26 handle="k8s-pod-network.84a559e2d0b8cfec088dc4bb3fa4cca002214e554282761058c744ec34e80e4b" host="10.200.20.12" Feb 12 19:40:49.458268 env[1347]: 2024-02-12 19:40:49.414 [INFO][2795] ipam.go 1216: Successfully claimed IPs: [192.168.119.1/26] block=192.168.119.0/26 handle="k8s-pod-network.84a559e2d0b8cfec088dc4bb3fa4cca002214e554282761058c744ec34e80e4b" host="10.200.20.12" Feb 12 19:40:49.458268 env[1347]: 2024-02-12 19:40:49.414 [INFO][2795] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.119.1/26] handle="k8s-pod-network.84a559e2d0b8cfec088dc4bb3fa4cca002214e554282761058c744ec34e80e4b" host="10.200.20.12" Feb 12 19:40:49.458268 env[1347]: 2024-02-12 19:40:49.414 [INFO][2795] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:40:49.458268 env[1347]: 2024-02-12 19:40:49.414 [INFO][2795] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.119.1/26] IPv6=[] ContainerID="84a559e2d0b8cfec088dc4bb3fa4cca002214e554282761058c744ec34e80e4b" HandleID="k8s-pod-network.84a559e2d0b8cfec088dc4bb3fa4cca002214e554282761058c744ec34e80e4b" Workload="10.200.20.12-k8s-nginx--deployment--6d5f899847--m94l7-eth0" Feb 12 19:40:49.458844 env[1347]: 2024-02-12 19:40:49.416 [INFO][2782] k8s.go 385: Populated endpoint ContainerID="84a559e2d0b8cfec088dc4bb3fa4cca002214e554282761058c744ec34e80e4b" Namespace="default" Pod="nginx-deployment-6d5f899847-m94l7" WorkloadEndpoint="10.200.20.12-k8s-nginx--deployment--6d5f899847--m94l7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12-k8s-nginx--deployment--6d5f899847--m94l7-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"dfd4dd87-ec69-4e3d-99ec-24f4279ddff1", ResourceVersion:"1216", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.12", ContainerID:"", Pod:"nginx-deployment-6d5f899847-m94l7", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.119.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calia3beb929c6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:40:49.458844 env[1347]: 2024-02-12 19:40:49.416 [INFO][2782] k8s.go 386: Calico CNI using IPs: [192.168.119.1/32] ContainerID="84a559e2d0b8cfec088dc4bb3fa4cca002214e554282761058c744ec34e80e4b" Namespace="default" Pod="nginx-deployment-6d5f899847-m94l7" WorkloadEndpoint="10.200.20.12-k8s-nginx--deployment--6d5f899847--m94l7-eth0" Feb 12 19:40:49.458844 env[1347]: 2024-02-12 19:40:49.416 [INFO][2782] dataplane_linux.go 68: Setting the host side veth name to calia3beb929c6e ContainerID="84a559e2d0b8cfec088dc4bb3fa4cca002214e554282761058c744ec34e80e4b" Namespace="default" Pod="nginx-deployment-6d5f899847-m94l7" WorkloadEndpoint="10.200.20.12-k8s-nginx--deployment--6d5f899847--m94l7-eth0" Feb 12 19:40:49.458844 env[1347]: 2024-02-12 19:40:49.437 [INFO][2782] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="84a559e2d0b8cfec088dc4bb3fa4cca002214e554282761058c744ec34e80e4b" Namespace="default" Pod="nginx-deployment-6d5f899847-m94l7" WorkloadEndpoint="10.200.20.12-k8s-nginx--deployment--6d5f899847--m94l7-eth0" Feb 12 19:40:49.458844 env[1347]: 2024-02-12 19:40:49.442 [INFO][2782] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="84a559e2d0b8cfec088dc4bb3fa4cca002214e554282761058c744ec34e80e4b" Namespace="default" Pod="nginx-deployment-6d5f899847-m94l7" WorkloadEndpoint="10.200.20.12-k8s-nginx--deployment--6d5f899847--m94l7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12-k8s-nginx--deployment--6d5f899847--m94l7-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"dfd4dd87-ec69-4e3d-99ec-24f4279ddff1", ResourceVersion:"1216", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.12", ContainerID:"84a559e2d0b8cfec088dc4bb3fa4cca002214e554282761058c744ec34e80e4b", Pod:"nginx-deployment-6d5f899847-m94l7", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.119.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calia3beb929c6e", MAC:"42:ee:2b:fa:62:50", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:40:49.458844 env[1347]: 2024-02-12 19:40:49.452 [INFO][2782] k8s.go 491: Wrote updated endpoint to datastore ContainerID="84a559e2d0b8cfec088dc4bb3fa4cca002214e554282761058c744ec34e80e4b" Namespace="default" Pod="nginx-deployment-6d5f899847-m94l7" WorkloadEndpoint="10.200.20.12-k8s-nginx--deployment--6d5f899847--m94l7-eth0" Feb 12 19:40:49.476853 kernel: kauditd_printk_skb: 129 callbacks suppressed Feb 12 19:40:49.476987 kernel: audit: type=1325 audit(1707766849.468:662): table=filter:72 family=2 entries=36 op=nft_register_chain pid=2819 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:40:49.468000 audit[2819]: NETFILTER_CFG table=filter:72 family=2 entries=36 op=nft_register_chain pid=2819 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:40:49.477218 env[1347]: time="2024-02-12T19:40:49.475055485Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:40:49.477218 env[1347]: time="2024-02-12T19:40:49.475109565Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:40:49.477218 env[1347]: time="2024-02-12T19:40:49.475119805Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:40:49.477218 env[1347]: time="2024-02-12T19:40:49.475256805Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/84a559e2d0b8cfec088dc4bb3fa4cca002214e554282761058c744ec34e80e4b pid=2828 runtime=io.containerd.runc.v2 Feb 12 19:40:49.468000 audit[2819]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19876 a0=3 a1=ffffe2b88070 a2=0 a3=ffff930d1fa8 items=0 ppid=2535 pid=2819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:49.525640 kernel: audit: type=1300 audit(1707766849.468:662): arch=c00000b7 syscall=211 success=yes exit=19876 a0=3 a1=ffffe2b88070 a2=0 a3=ffff930d1fa8 items=0 ppid=2535 pid=2819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:49.468000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:40:49.541810 kernel: audit: type=1327 audit(1707766849.468:662): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:40:49.545038 systemd[1]: Started cri-containerd-84a559e2d0b8cfec088dc4bb3fa4cca002214e554282761058c744ec34e80e4b.scope. Feb 12 19:40:49.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.588464 kernel: audit: type=1400 audit(1707766849.553:663): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.588578 kernel: audit: type=1400 audit(1707766849.553:664): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.588749 kernel: audit: type=1400 audit(1707766849.553:665): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.623222 kernel: audit: type=1400 audit(1707766849.553:666): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.640608 kernel: audit: type=1400 audit(1707766849.553:667): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.640705 kernel: audit: type=1400 audit(1707766849.553:668): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.675880 kernel: audit: type=1400 audit(1707766849.553:669): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.570000 audit: BPF prog-id=88 op=LOAD Feb 12 19:40:49.587000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.587000 audit[2836]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2828 pid=2836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:49.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834613535396532643062386366656330383864633462623366613463 Feb 12 19:40:49.587000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.587000 audit[2836]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2828 pid=2836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:49.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834613535396532643062386366656330383864633462623366613463 Feb 12 19:40:49.587000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.587000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.587000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.587000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.587000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.587000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.587000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.587000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.587000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.587000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.587000 audit: BPF prog-id=89 op=LOAD Feb 12 19:40:49.587000 audit[2836]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2828 pid=2836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:49.587000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834613535396532643062386366656330383864633462623366613463 Feb 12 19:40:49.604000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.604000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.604000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.604000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.604000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.604000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.604000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.604000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.604000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.604000 audit: BPF prog-id=90 op=LOAD Feb 12 19:40:49.604000 audit[2836]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2828 pid=2836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:49.604000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834613535396532643062386366656330383864633462623366613463 Feb 12 19:40:49.622000 audit: BPF prog-id=90 op=UNLOAD Feb 12 19:40:49.622000 audit: BPF prog-id=89 op=UNLOAD Feb 12 19:40:49.622000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.622000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.622000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.622000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.622000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.622000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.622000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.622000 audit[2836]: AVC avc: denied { perfmon } for pid=2836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.622000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.622000 audit[2836]: AVC avc: denied { bpf } for pid=2836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:49.622000 audit: BPF prog-id=91 op=LOAD Feb 12 19:40:49.622000 audit[2836]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2828 pid=2836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:49.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834613535396532643062386366656330383864633462623366613463 Feb 12 19:40:49.696183 env[1347]: time="2024-02-12T19:40:49.696141627Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nginx-deployment-6d5f899847-m94l7,Uid:dfd4dd87-ec69-4e3d-99ec-24f4279ddff1,Namespace:default,Attempt:1,} returns sandbox id \"84a559e2d0b8cfec088dc4bb3fa4cca002214e554282761058c744ec34e80e4b\"" Feb 12 19:40:49.698480 env[1347]: time="2024-02-12T19:40:49.698449063Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 12 19:40:50.095870 kubelet[1901]: E0212 19:40:50.095816 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:50.276145 systemd[1]: run-containerd-runc-k8s.io-84a559e2d0b8cfec088dc4bb3fa4cca002214e554282761058c744ec34e80e4b-runc.mjqBbx.mount: Deactivated successfully. Feb 12 19:40:51.096327 kubelet[1901]: E0212 19:40:51.096266 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:51.203126 env[1347]: time="2024-02-12T19:40:51.202263145Z" level=info msg="StopPodSandbox for \"7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29\"" Feb 12 19:40:51.321750 env[1347]: 2024-02-12 19:40:51.269 [INFO][2881] k8s.go 578: Cleaning up netns ContainerID="7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29" Feb 12 19:40:51.321750 env[1347]: 2024-02-12 19:40:51.269 [INFO][2881] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29" iface="eth0" netns="/var/run/netns/cni-a96e49c0-9e64-21f5-56ec-78b420f7901c" Feb 12 19:40:51.321750 env[1347]: 2024-02-12 19:40:51.269 [INFO][2881] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29" iface="eth0" netns="/var/run/netns/cni-a96e49c0-9e64-21f5-56ec-78b420f7901c" Feb 12 19:40:51.321750 env[1347]: 2024-02-12 19:40:51.269 [INFO][2881] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29" iface="eth0" netns="/var/run/netns/cni-a96e49c0-9e64-21f5-56ec-78b420f7901c" Feb 12 19:40:51.321750 env[1347]: 2024-02-12 19:40:51.269 [INFO][2881] k8s.go 585: Releasing IP address(es) ContainerID="7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29" Feb 12 19:40:51.321750 env[1347]: 2024-02-12 19:40:51.269 [INFO][2881] utils.go 188: Calico CNI releasing IP address ContainerID="7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29" Feb 12 19:40:51.321750 env[1347]: 2024-02-12 19:40:51.305 [INFO][2887] ipam_plugin.go 415: Releasing address using handleID ContainerID="7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29" HandleID="k8s-pod-network.7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29" Workload="10.200.20.12-k8s-csi--node--driver--xlm9b-eth0" Feb 12 19:40:51.321750 env[1347]: 2024-02-12 19:40:51.306 [INFO][2887] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:40:51.321750 env[1347]: 2024-02-12 19:40:51.306 [INFO][2887] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:40:51.321750 env[1347]: 2024-02-12 19:40:51.317 [WARNING][2887] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29" HandleID="k8s-pod-network.7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29" Workload="10.200.20.12-k8s-csi--node--driver--xlm9b-eth0" Feb 12 19:40:51.321750 env[1347]: 2024-02-12 19:40:51.317 [INFO][2887] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29" HandleID="k8s-pod-network.7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29" Workload="10.200.20.12-k8s-csi--node--driver--xlm9b-eth0" Feb 12 19:40:51.321750 env[1347]: 2024-02-12 19:40:51.319 [INFO][2887] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:40:51.321750 env[1347]: 2024-02-12 19:40:51.320 [INFO][2881] k8s.go 591: Teardown processing complete. ContainerID="7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29" Feb 12 19:40:51.323424 systemd[1]: run-netns-cni\x2da96e49c0\x2d9e64\x2d21f5\x2d56ec\x2d78b420f7901c.mount: Deactivated successfully. Feb 12 19:40:51.325492 env[1347]: time="2024-02-12T19:40:51.324124426Z" level=info msg="TearDown network for sandbox \"7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29\" successfully" Feb 12 19:40:51.325492 env[1347]: time="2024-02-12T19:40:51.324171906Z" level=info msg="StopPodSandbox for \"7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29\" returns successfully" Feb 12 19:40:51.326548 env[1347]: time="2024-02-12T19:40:51.326514942Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xlm9b,Uid:5067e866-4534-40f4-9993-6dcb1c81e037,Namespace:calico-system,Attempt:1,}" Feb 12 19:40:51.430982 systemd-networkd[1496]: calia3beb929c6e: Gained IPv6LL Feb 12 19:40:51.816197 systemd-networkd[1496]: cali615cc29472a: Link UP Feb 12 19:40:51.829175 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:40:51.829286 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali615cc29472a: link becomes ready Feb 12 19:40:51.829610 systemd-networkd[1496]: cali615cc29472a: Gained carrier Feb 12 19:40:51.846980 env[1347]: 2024-02-12 19:40:51.725 [INFO][2894] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.12-k8s-csi--node--driver--xlm9b-eth0 csi-node-driver- calico-system 5067e866-4534-40f4-9993-6dcb1c81e037 1228 0 2024-02-12 19:40:20 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:676488fcc9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.12 csi-node-driver-xlm9b eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali615cc29472a [] []}} ContainerID="7147364b4e8f6f7ef0db97996b3809b84ffefc74f4f93bf8bdb750b8ee1d9646" Namespace="calico-system" Pod="csi-node-driver-xlm9b" WorkloadEndpoint="10.200.20.12-k8s-csi--node--driver--xlm9b-" Feb 12 19:40:51.846980 env[1347]: 2024-02-12 19:40:51.725 [INFO][2894] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="7147364b4e8f6f7ef0db97996b3809b84ffefc74f4f93bf8bdb750b8ee1d9646" Namespace="calico-system" Pod="csi-node-driver-xlm9b" WorkloadEndpoint="10.200.20.12-k8s-csi--node--driver--xlm9b-eth0" Feb 12 19:40:51.846980 env[1347]: 2024-02-12 19:40:51.765 [INFO][2907] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7147364b4e8f6f7ef0db97996b3809b84ffefc74f4f93bf8bdb750b8ee1d9646" HandleID="k8s-pod-network.7147364b4e8f6f7ef0db97996b3809b84ffefc74f4f93bf8bdb750b8ee1d9646" Workload="10.200.20.12-k8s-csi--node--driver--xlm9b-eth0" Feb 12 19:40:51.846980 env[1347]: 2024-02-12 19:40:51.788 [INFO][2907] ipam_plugin.go 268: Auto assigning IP ContainerID="7147364b4e8f6f7ef0db97996b3809b84ffefc74f4f93bf8bdb750b8ee1d9646" HandleID="k8s-pod-network.7147364b4e8f6f7ef0db97996b3809b84ffefc74f4f93bf8bdb750b8ee1d9646" Workload="10.200.20.12-k8s-csi--node--driver--xlm9b-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000118400), Attrs:map[string]string{"namespace":"calico-system", "node":"10.200.20.12", "pod":"csi-node-driver-xlm9b", "timestamp":"2024-02-12 19:40:51.765432105 +0000 UTC"}, Hostname:"10.200.20.12", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:40:51.846980 env[1347]: 2024-02-12 19:40:51.788 [INFO][2907] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:40:51.846980 env[1347]: 2024-02-12 19:40:51.788 [INFO][2907] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:40:51.846980 env[1347]: 2024-02-12 19:40:51.788 [INFO][2907] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.12' Feb 12 19:40:51.846980 env[1347]: 2024-02-12 19:40:51.792 [INFO][2907] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7147364b4e8f6f7ef0db97996b3809b84ffefc74f4f93bf8bdb750b8ee1d9646" host="10.200.20.12" Feb 12 19:40:51.846980 env[1347]: 2024-02-12 19:40:51.795 [INFO][2907] ipam.go 372: Looking up existing affinities for host host="10.200.20.12" Feb 12 19:40:51.846980 env[1347]: 2024-02-12 19:40:51.799 [INFO][2907] ipam.go 489: Trying affinity for 192.168.119.0/26 host="10.200.20.12" Feb 12 19:40:51.846980 env[1347]: 2024-02-12 19:40:51.801 [INFO][2907] ipam.go 155: Attempting to load block cidr=192.168.119.0/26 host="10.200.20.12" Feb 12 19:40:51.846980 env[1347]: 2024-02-12 19:40:51.803 [INFO][2907] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.119.0/26 host="10.200.20.12" Feb 12 19:40:51.846980 env[1347]: 2024-02-12 19:40:51.803 [INFO][2907] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.119.0/26 handle="k8s-pod-network.7147364b4e8f6f7ef0db97996b3809b84ffefc74f4f93bf8bdb750b8ee1d9646" host="10.200.20.12" Feb 12 19:40:51.846980 env[1347]: 2024-02-12 19:40:51.804 [INFO][2907] ipam.go 1682: Creating new handle: k8s-pod-network.7147364b4e8f6f7ef0db97996b3809b84ffefc74f4f93bf8bdb750b8ee1d9646 Feb 12 19:40:51.846980 env[1347]: 2024-02-12 19:40:51.807 [INFO][2907] ipam.go 1203: Writing block in order to claim IPs block=192.168.119.0/26 handle="k8s-pod-network.7147364b4e8f6f7ef0db97996b3809b84ffefc74f4f93bf8bdb750b8ee1d9646" host="10.200.20.12" Feb 12 19:40:51.846980 env[1347]: 2024-02-12 19:40:51.812 [INFO][2907] ipam.go 1216: Successfully claimed IPs: [192.168.119.2/26] block=192.168.119.0/26 handle="k8s-pod-network.7147364b4e8f6f7ef0db97996b3809b84ffefc74f4f93bf8bdb750b8ee1d9646" host="10.200.20.12" Feb 12 19:40:51.846980 env[1347]: 2024-02-12 19:40:51.813 [INFO][2907] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.119.2/26] handle="k8s-pod-network.7147364b4e8f6f7ef0db97996b3809b84ffefc74f4f93bf8bdb750b8ee1d9646" host="10.200.20.12" Feb 12 19:40:51.846980 env[1347]: 2024-02-12 19:40:51.813 [INFO][2907] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:40:51.846980 env[1347]: 2024-02-12 19:40:51.813 [INFO][2907] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.119.2/26] IPv6=[] ContainerID="7147364b4e8f6f7ef0db97996b3809b84ffefc74f4f93bf8bdb750b8ee1d9646" HandleID="k8s-pod-network.7147364b4e8f6f7ef0db97996b3809b84ffefc74f4f93bf8bdb750b8ee1d9646" Workload="10.200.20.12-k8s-csi--node--driver--xlm9b-eth0" Feb 12 19:40:51.847564 env[1347]: 2024-02-12 19:40:51.814 [INFO][2894] k8s.go 385: Populated endpoint ContainerID="7147364b4e8f6f7ef0db97996b3809b84ffefc74f4f93bf8bdb750b8ee1d9646" Namespace="calico-system" Pod="csi-node-driver-xlm9b" WorkloadEndpoint="10.200.20.12-k8s-csi--node--driver--xlm9b-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12-k8s-csi--node--driver--xlm9b-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5067e866-4534-40f4-9993-6dcb1c81e037", ResourceVersion:"1228", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.12", ContainerID:"", Pod:"csi-node-driver-xlm9b", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.119.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali615cc29472a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:40:51.847564 env[1347]: 2024-02-12 19:40:51.814 [INFO][2894] k8s.go 386: Calico CNI using IPs: [192.168.119.2/32] ContainerID="7147364b4e8f6f7ef0db97996b3809b84ffefc74f4f93bf8bdb750b8ee1d9646" Namespace="calico-system" Pod="csi-node-driver-xlm9b" WorkloadEndpoint="10.200.20.12-k8s-csi--node--driver--xlm9b-eth0" Feb 12 19:40:51.847564 env[1347]: 2024-02-12 19:40:51.814 [INFO][2894] dataplane_linux.go 68: Setting the host side veth name to cali615cc29472a ContainerID="7147364b4e8f6f7ef0db97996b3809b84ffefc74f4f93bf8bdb750b8ee1d9646" Namespace="calico-system" Pod="csi-node-driver-xlm9b" WorkloadEndpoint="10.200.20.12-k8s-csi--node--driver--xlm9b-eth0" Feb 12 19:40:51.847564 env[1347]: 2024-02-12 19:40:51.830 [INFO][2894] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="7147364b4e8f6f7ef0db97996b3809b84ffefc74f4f93bf8bdb750b8ee1d9646" Namespace="calico-system" Pod="csi-node-driver-xlm9b" WorkloadEndpoint="10.200.20.12-k8s-csi--node--driver--xlm9b-eth0" Feb 12 19:40:51.847564 env[1347]: 2024-02-12 19:40:51.838 [INFO][2894] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="7147364b4e8f6f7ef0db97996b3809b84ffefc74f4f93bf8bdb750b8ee1d9646" Namespace="calico-system" Pod="csi-node-driver-xlm9b" WorkloadEndpoint="10.200.20.12-k8s-csi--node--driver--xlm9b-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12-k8s-csi--node--driver--xlm9b-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5067e866-4534-40f4-9993-6dcb1c81e037", ResourceVersion:"1228", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.12", ContainerID:"7147364b4e8f6f7ef0db97996b3809b84ffefc74f4f93bf8bdb750b8ee1d9646", Pod:"csi-node-driver-xlm9b", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.119.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali615cc29472a", MAC:"26:38:d6:37:74:0a", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:40:51.847564 env[1347]: 2024-02-12 19:40:51.845 [INFO][2894] k8s.go 491: Wrote updated endpoint to datastore ContainerID="7147364b4e8f6f7ef0db97996b3809b84ffefc74f4f93bf8bdb750b8ee1d9646" Namespace="calico-system" Pod="csi-node-driver-xlm9b" WorkloadEndpoint="10.200.20.12-k8s-csi--node--driver--xlm9b-eth0" Feb 12 19:40:51.874000 audit[2929]: NETFILTER_CFG table=filter:73 family=2 entries=40 op=nft_register_chain pid=2929 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:40:51.874000 audit[2929]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21096 a0=3 a1=ffffd26b8620 a2=0 a3=ffffbdfb9fa8 items=0 ppid=2535 pid=2929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:51.874000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:40:51.882723 env[1347]: time="2024-02-12T19:40:51.881947955Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:40:51.882723 env[1347]: time="2024-02-12T19:40:51.882017475Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:40:51.882723 env[1347]: time="2024-02-12T19:40:51.882027235Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:40:51.882723 env[1347]: time="2024-02-12T19:40:51.882130795Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7147364b4e8f6f7ef0db97996b3809b84ffefc74f4f93bf8bdb750b8ee1d9646 pid=2937 runtime=io.containerd.runc.v2 Feb 12 19:40:51.905236 systemd[1]: Started cri-containerd-7147364b4e8f6f7ef0db97996b3809b84ffefc74f4f93bf8bdb750b8ee1d9646.scope. Feb 12 19:40:51.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.917000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.917000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.917000 audit: BPF prog-id=92 op=LOAD Feb 12 19:40:51.918000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.918000 audit[2948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2937 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:51.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731343733363462346538663666376566306462393739393662333830 Feb 12 19:40:51.918000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.918000 audit[2948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2937 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:51.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731343733363462346538663666376566306462393739393662333830 Feb 12 19:40:51.918000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.918000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.918000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.918000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.918000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.918000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.918000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.918000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.918000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.918000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.918000 audit: BPF prog-id=93 op=LOAD Feb 12 19:40:51.918000 audit[2948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2937 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:51.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731343733363462346538663666376566306462393739393662333830 Feb 12 19:40:51.919000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.919000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.919000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.919000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.919000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.919000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.919000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.919000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.919000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.919000 audit: BPF prog-id=94 op=LOAD Feb 12 19:40:51.919000 audit[2948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2937 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:51.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731343733363462346538663666376566306462393739393662333830 Feb 12 19:40:51.920000 audit: BPF prog-id=94 op=UNLOAD Feb 12 19:40:51.920000 audit: BPF prog-id=93 op=UNLOAD Feb 12 19:40:51.920000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.920000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.920000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.920000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.920000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.920000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.920000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.920000 audit[2948]: AVC avc: denied { perfmon } for pid=2948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.920000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.920000 audit[2948]: AVC avc: denied { bpf } for pid=2948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:51.920000 audit: BPF prog-id=95 op=LOAD Feb 12 19:40:51.920000 audit[2948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2937 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:51.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731343733363462346538663666376566306462393739393662333830 Feb 12 19:40:51.942247 env[1347]: time="2024-02-12T19:40:51.942192856Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xlm9b,Uid:5067e866-4534-40f4-9993-6dcb1c81e037,Namespace:calico-system,Attempt:1,} returns sandbox id \"7147364b4e8f6f7ef0db97996b3809b84ffefc74f4f93bf8bdb750b8ee1d9646\"" Feb 12 19:40:52.096952 kubelet[1901]: E0212 19:40:52.096892 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:52.641300 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2219032363.mount: Deactivated successfully. Feb 12 19:40:53.097466 kubelet[1901]: E0212 19:40:53.097411 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:53.548767 env[1347]: time="2024-02-12T19:40:53.548644748Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:53.554935 env[1347]: time="2024-02-12T19:40:53.554898618Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:53.560394 env[1347]: time="2024-02-12T19:40:53.560352090Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:53.563728 env[1347]: time="2024-02-12T19:40:53.563689685Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:53.564463 env[1347]: time="2024-02-12T19:40:53.564436443Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b\"" Feb 12 19:40:53.566173 env[1347]: time="2024-02-12T19:40:53.565649722Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 12 19:40:53.566294 env[1347]: time="2024-02-12T19:40:53.566260601Z" level=info msg="CreateContainer within sandbox \"84a559e2d0b8cfec088dc4bb3fa4cca002214e554282761058c744ec34e80e4b\" for container &ContainerMetadata{Name:nginx,Attempt:0,}" Feb 12 19:40:53.599878 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2904736563.mount: Deactivated successfully. Feb 12 19:40:53.615933 env[1347]: time="2024-02-12T19:40:53.615883203Z" level=info msg="CreateContainer within sandbox \"84a559e2d0b8cfec088dc4bb3fa4cca002214e554282761058c744ec34e80e4b\" for &ContainerMetadata{Name:nginx,Attempt:0,} returns container id \"eb3b7231088709b5269e96176ae68c487bb3e59449ff0b5404cf77eb46d35a41\"" Feb 12 19:40:53.616489 env[1347]: time="2024-02-12T19:40:53.616413922Z" level=info msg="StartContainer for \"eb3b7231088709b5269e96176ae68c487bb3e59449ff0b5404cf77eb46d35a41\"" Feb 12 19:40:53.632899 systemd[1]: Started cri-containerd-eb3b7231088709b5269e96176ae68c487bb3e59449ff0b5404cf77eb46d35a41.scope. Feb 12 19:40:53.636311 systemd[1]: run-containerd-runc-k8s.io-eb3b7231088709b5269e96176ae68c487bb3e59449ff0b5404cf77eb46d35a41-runc.aDkJ92.mount: Deactivated successfully. Feb 12 19:40:53.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.647000 audit: BPF prog-id=96 op=LOAD Feb 12 19:40:53.647000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.647000 audit[2981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2828 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:53.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562336237323331303838373039623532363965393631373661653638 Feb 12 19:40:53.648000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.648000 audit[2981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2828 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:53.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562336237323331303838373039623532363965393631373661653638 Feb 12 19:40:53.648000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.648000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.648000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.648000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.648000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.648000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.648000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.648000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.648000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.648000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.648000 audit: BPF prog-id=97 op=LOAD Feb 12 19:40:53.648000 audit[2981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2828 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:53.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562336237323331303838373039623532363965393631373661653638 Feb 12 19:40:53.648000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.648000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.648000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.648000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.648000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.648000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.648000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.648000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.648000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.648000 audit: BPF prog-id=98 op=LOAD Feb 12 19:40:53.648000 audit[2981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2828 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:53.648000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562336237323331303838373039623532363965393631373661653638 Feb 12 19:40:53.649000 audit: BPF prog-id=98 op=UNLOAD Feb 12 19:40:53.649000 audit: BPF prog-id=97 op=UNLOAD Feb 12 19:40:53.649000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.649000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.649000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.649000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.649000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.649000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.649000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.649000 audit[2981]: AVC avc: denied { perfmon } for pid=2981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.649000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.649000 audit[2981]: AVC avc: denied { bpf } for pid=2981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:53.649000 audit: BPF prog-id=99 op=LOAD Feb 12 19:40:53.649000 audit[2981]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2828 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:53.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562336237323331303838373039623532363965393631373661653638 Feb 12 19:40:53.669134 env[1347]: time="2024-02-12T19:40:53.669087160Z" level=info msg="StartContainer for \"eb3b7231088709b5269e96176ae68c487bb3e59449ff0b5404cf77eb46d35a41\" returns successfully" Feb 12 19:40:53.798879 systemd-networkd[1496]: cali615cc29472a: Gained IPv6LL Feb 12 19:40:54.098340 kubelet[1901]: E0212 19:40:54.098312 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:54.292829 kubelet[1901]: I0212 19:40:54.292791 1901 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nginx-deployment-6d5f899847-m94l7" podStartSLOduration=15.425746937 podCreationTimestamp="2024-02-12 19:40:35 +0000 UTC" firstStartedPulling="2024-02-12 19:40:49.697858104 +0000 UTC m=+31.083924853" lastFinishedPulling="2024-02-12 19:40:53.564866443 +0000 UTC m=+34.950933232" observedRunningTime="2024-02-12 19:40:54.292493316 +0000 UTC m=+35.678560105" watchObservedRunningTime="2024-02-12 19:40:54.292755316 +0000 UTC m=+35.678822105" Feb 12 19:40:55.098700 kubelet[1901]: E0212 19:40:55.098664 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:55.248442 env[1347]: time="2024-02-12T19:40:55.248394345Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:55.254411 env[1347]: time="2024-02-12T19:40:55.254373856Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:55.258991 env[1347]: time="2024-02-12T19:40:55.258957169Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:55.262653 env[1347]: time="2024-02-12T19:40:55.262620524Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:55.262968 env[1347]: time="2024-02-12T19:40:55.262938203Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8\"" Feb 12 19:40:55.265241 env[1347]: time="2024-02-12T19:40:55.265194880Z" level=info msg="CreateContainer within sandbox \"7147364b4e8f6f7ef0db97996b3809b84ffefc74f4f93bf8bdb750b8ee1d9646\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 12 19:40:55.299067 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1375175628.mount: Deactivated successfully. Feb 12 19:40:55.313915 env[1347]: time="2024-02-12T19:40:55.313864367Z" level=info msg="CreateContainer within sandbox \"7147364b4e8f6f7ef0db97996b3809b84ffefc74f4f93bf8bdb750b8ee1d9646\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"cc0269e8cb58ee82a3c712635cbe410940b955d68c384dee6df1d607a9613907\"" Feb 12 19:40:55.314669 env[1347]: time="2024-02-12T19:40:55.314647926Z" level=info msg="StartContainer for \"cc0269e8cb58ee82a3c712635cbe410940b955d68c384dee6df1d607a9613907\"" Feb 12 19:40:55.331892 systemd[1]: Started cri-containerd-cc0269e8cb58ee82a3c712635cbe410940b955d68c384dee6df1d607a9613907.scope. Feb 12 19:40:55.374048 kernel: kauditd_printk_skb: 167 callbacks suppressed Feb 12 19:40:55.374260 kernel: audit: type=1400 audit(1707766855.349:718): avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:55.349000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:55.349000 audit[3043]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2937 pid=3043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:55.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363303236396538636235386565383261336337313236333563626534 Feb 12 19:40:55.427248 kernel: audit: type=1300 audit(1707766855.349:718): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2937 pid=3043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:55.427361 kernel: audit: type=1327 audit(1707766855.349:718): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363303236396538636235386565383261336337313236333563626534 Feb 12 19:40:55.349000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:55.446309 kernel: audit: type=1400 audit(1707766855.349:719): avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:55.349000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:55.465003 kernel: audit: type=1400 audit(1707766855.349:719): avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:55.349000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:55.481866 kernel: audit: type=1400 audit(1707766855.349:719): avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:55.482322 env[1347]: time="2024-02-12T19:40:55.482146916Z" level=info msg="StartContainer for \"cc0269e8cb58ee82a3c712635cbe410940b955d68c384dee6df1d607a9613907\" returns successfully" Feb 12 19:40:55.349000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:55.483679 env[1347]: time="2024-02-12T19:40:55.483598554Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 12 19:40:55.349000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:55.501799 kernel: audit: type=1400 audit(1707766855.349:719): avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:55.349000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:55.538712 kernel: audit: type=1400 audit(1707766855.349:719): avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:55.538832 kernel: audit: type=1400 audit(1707766855.349:719): avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:55.349000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:55.556021 kernel: audit: type=1400 audit(1707766855.349:719): avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:55.349000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:55.349000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:55.349000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:55.349000 audit: BPF prog-id=100 op=LOAD Feb 12 19:40:55.349000 audit[3043]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2937 pid=3043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:55.349000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363303236396538636235386565383261336337313236333563626534 Feb 12 19:40:55.354000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:55.354000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:55.354000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:55.354000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:55.354000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:55.354000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:55.354000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:55.354000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:55.354000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:55.354000 audit: BPF prog-id=101 op=LOAD Feb 12 19:40:55.354000 audit[3043]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2937 pid=3043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:55.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363303236396538636235386565383261336337313236333563626534 Feb 12 19:40:55.372000 audit: BPF prog-id=101 op=UNLOAD Feb 12 19:40:55.372000 audit: BPF prog-id=100 op=UNLOAD Feb 12 19:40:55.372000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:55.372000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:55.372000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:55.372000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:55.372000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:55.372000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:55.372000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:55.372000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:55.372000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:55.372000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:55.372000 audit: BPF prog-id=102 op=LOAD Feb 12 19:40:55.372000 audit[3043]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2937 pid=3043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:55.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363303236396538636235386565383261336337313236333563626534 Feb 12 19:40:56.099254 kubelet[1901]: E0212 19:40:56.099211 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:57.099698 kubelet[1901]: E0212 19:40:57.099645 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:57.425467 env[1347]: time="2024-02-12T19:40:57.425354752Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:57.432945 env[1347]: time="2024-02-12T19:40:57.432881981Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:57.439984 env[1347]: time="2024-02-12T19:40:57.439951691Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:57.445617 env[1347]: time="2024-02-12T19:40:57.445571843Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:57.446072 env[1347]: time="2024-02-12T19:40:57.446046122Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43\"" Feb 12 19:40:57.447919 env[1347]: time="2024-02-12T19:40:57.447889400Z" level=info msg="CreateContainer within sandbox \"7147364b4e8f6f7ef0db97996b3809b84ffefc74f4f93bf8bdb750b8ee1d9646\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 12 19:40:57.478149 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount752137758.mount: Deactivated successfully. Feb 12 19:40:57.494400 env[1347]: time="2024-02-12T19:40:57.494336133Z" level=info msg="CreateContainer within sandbox \"7147364b4e8f6f7ef0db97996b3809b84ffefc74f4f93bf8bdb750b8ee1d9646\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"f33821f630112200b9bd945179fd8c4e7721a8cf2b88393e25c8c7a413fc11d4\"" Feb 12 19:40:57.495233 env[1347]: time="2024-02-12T19:40:57.495208732Z" level=info msg="StartContainer for \"f33821f630112200b9bd945179fd8c4e7721a8cf2b88393e25c8c7a413fc11d4\"" Feb 12 19:40:57.517759 systemd[1]: Started cri-containerd-f33821f630112200b9bd945179fd8c4e7721a8cf2b88393e25c8c7a413fc11d4.scope. Feb 12 19:40:57.521091 systemd[1]: run-containerd-runc-k8s.io-f33821f630112200b9bd945179fd8c4e7721a8cf2b88393e25c8c7a413fc11d4-runc.UIYF9O.mount: Deactivated successfully. Feb 12 19:40:57.535000 audit[3081]: AVC avc: denied { perfmon } for pid=3081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.535000 audit[3081]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2937 pid=3081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:57.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633333832316636333031313232303062396264393435313739666438 Feb 12 19:40:57.536000 audit[3081]: AVC avc: denied { bpf } for pid=3081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.536000 audit[3081]: AVC avc: denied { bpf } for pid=3081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.536000 audit[3081]: AVC avc: denied { bpf } for pid=3081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.536000 audit[3081]: AVC avc: denied { perfmon } for pid=3081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.536000 audit[3081]: AVC avc: denied { perfmon } for pid=3081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.536000 audit[3081]: AVC avc: denied { perfmon } for pid=3081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.536000 audit[3081]: AVC avc: denied { perfmon } for pid=3081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.536000 audit[3081]: AVC avc: denied { perfmon } for pid=3081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.536000 audit[3081]: AVC avc: denied { bpf } for pid=3081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.536000 audit[3081]: AVC avc: denied { bpf } for pid=3081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.536000 audit: BPF prog-id=103 op=LOAD Feb 12 19:40:57.536000 audit[3081]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2937 pid=3081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:57.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633333832316636333031313232303062396264393435313739666438 Feb 12 19:40:57.536000 audit[3081]: AVC avc: denied { bpf } for pid=3081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.536000 audit[3081]: AVC avc: denied { bpf } for pid=3081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.536000 audit[3081]: AVC avc: denied { perfmon } for pid=3081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.536000 audit[3081]: AVC avc: denied { perfmon } for pid=3081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.536000 audit[3081]: AVC avc: denied { perfmon } for pid=3081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.536000 audit[3081]: AVC avc: denied { perfmon } for pid=3081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.536000 audit[3081]: AVC avc: denied { perfmon } for pid=3081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.536000 audit[3081]: AVC avc: denied { bpf } for pid=3081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.536000 audit[3081]: AVC avc: denied { bpf } for pid=3081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.536000 audit: BPF prog-id=104 op=LOAD Feb 12 19:40:57.536000 audit[3081]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2937 pid=3081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:57.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633333832316636333031313232303062396264393435313739666438 Feb 12 19:40:57.537000 audit: BPF prog-id=104 op=UNLOAD Feb 12 19:40:57.537000 audit: BPF prog-id=103 op=UNLOAD Feb 12 19:40:57.537000 audit[3081]: AVC avc: denied { bpf } for pid=3081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.537000 audit[3081]: AVC avc: denied { bpf } for pid=3081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.537000 audit[3081]: AVC avc: denied { bpf } for pid=3081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.537000 audit[3081]: AVC avc: denied { perfmon } for pid=3081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.537000 audit[3081]: AVC avc: denied { perfmon } for pid=3081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.537000 audit[3081]: AVC avc: denied { perfmon } for pid=3081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.537000 audit[3081]: AVC avc: denied { perfmon } for pid=3081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.537000 audit[3081]: AVC avc: denied { perfmon } for pid=3081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.537000 audit[3081]: AVC avc: denied { bpf } for pid=3081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.537000 audit[3081]: AVC avc: denied { bpf } for pid=3081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.537000 audit: BPF prog-id=105 op=LOAD Feb 12 19:40:57.537000 audit[3081]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2937 pid=3081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:57.537000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633333832316636333031313232303062396264393435313739666438 Feb 12 19:40:57.556207 env[1347]: time="2024-02-12T19:40:57.556149485Z" level=info msg="StartContainer for \"f33821f630112200b9bd945179fd8c4e7721a8cf2b88393e25c8c7a413fc11d4\" returns successfully" Feb 12 19:40:58.100620 kubelet[1901]: E0212 19:40:58.100572 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:58.161820 kubelet[1901]: I0212 19:40:58.161517 1901 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 12 19:40:58.161820 kubelet[1901]: I0212 19:40:58.161552 1901 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 12 19:40:58.304942 kubelet[1901]: I0212 19:40:58.304907 1901 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-xlm9b" podStartSLOduration=32.801941795 podCreationTimestamp="2024-02-12 19:40:20 +0000 UTC" firstStartedPulling="2024-02-12 19:40:51.943401254 +0000 UTC m=+33.329468043" lastFinishedPulling="2024-02-12 19:40:57.446331482 +0000 UTC m=+38.832398271" observedRunningTime="2024-02-12 19:40:58.304684743 +0000 UTC m=+39.690751492" watchObservedRunningTime="2024-02-12 19:40:58.304872023 +0000 UTC m=+39.690938812" Feb 12 19:40:59.078957 kubelet[1901]: E0212 19:40:59.078925 1901 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:40:59.101072 kubelet[1901]: E0212 19:40:59.101048 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:00.102012 kubelet[1901]: E0212 19:41:00.101976 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:01.102078 kubelet[1901]: E0212 19:41:01.102046 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:02.102925 kubelet[1901]: E0212 19:41:02.102886 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:02.480000 audit[3114]: NETFILTER_CFG table=filter:74 family=2 entries=20 op=nft_register_rule pid=3114 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:02.484764 kubelet[1901]: I0212 19:41:02.483784 1901 topology_manager.go:215] "Topology Admit Handler" podUID="aa10f60d-9ace-4fd1-9006-8b58b6f30c4e" podNamespace="default" podName="nfs-server-provisioner-0" Feb 12 19:41:02.487416 kernel: kauditd_printk_skb: 76 callbacks suppressed Feb 12 19:41:02.487531 kernel: audit: type=1325 audit(1707766862.480:730): table=filter:74 family=2 entries=20 op=nft_register_rule pid=3114 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:02.480000 audit[3114]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11292 a0=3 a1=fffff494ed80 a2=0 a3=ffffa72ca6c0 items=0 ppid=2143 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:02.528262 kernel: audit: type=1300 audit(1707766862.480:730): arch=c00000b7 syscall=211 success=yes exit=11292 a0=3 a1=fffff494ed80 a2=0 a3=ffffa72ca6c0 items=0 ppid=2143 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:02.480000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:02.541797 kernel: audit: type=1327 audit(1707766862.480:730): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:02.483000 audit[3114]: NETFILTER_CFG table=nat:75 family=2 entries=22 op=nft_register_rule pid=3114 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:02.553796 kubelet[1901]: I0212 19:41:02.553772 1901 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"data\" (UniqueName: \"kubernetes.io/empty-dir/aa10f60d-9ace-4fd1-9006-8b58b6f30c4e-data\") pod \"nfs-server-provisioner-0\" (UID: \"aa10f60d-9ace-4fd1-9006-8b58b6f30c4e\") " pod="default/nfs-server-provisioner-0" Feb 12 19:41:02.554149 kubelet[1901]: I0212 19:41:02.554134 1901 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8vdfn\" (UniqueName: \"kubernetes.io/projected/aa10f60d-9ace-4fd1-9006-8b58b6f30c4e-kube-api-access-8vdfn\") pod \"nfs-server-provisioner-0\" (UID: \"aa10f60d-9ace-4fd1-9006-8b58b6f30c4e\") " pod="default/nfs-server-provisioner-0" Feb 12 19:41:02.558853 systemd[1]: Created slice kubepods-besteffort-podaa10f60d_9ace_4fd1_9006_8b58b6f30c4e.slice. Feb 12 19:41:02.483000 audit[3114]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6212 a0=3 a1=fffff494ed80 a2=0 a3=ffffa72ca6c0 items=0 ppid=2143 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:02.588286 kernel: audit: type=1325 audit(1707766862.483:731): table=nat:75 family=2 entries=22 op=nft_register_rule pid=3114 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:02.588379 kernel: audit: type=1300 audit(1707766862.483:731): arch=c00000b7 syscall=211 success=yes exit=6212 a0=3 a1=fffff494ed80 a2=0 a3=ffffa72ca6c0 items=0 ppid=2143 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:02.483000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:02.601766 kernel: audit: type=1327 audit(1707766862.483:731): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:02.587000 audit[3118]: NETFILTER_CFG table=filter:76 family=2 entries=32 op=nft_register_rule pid=3118 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:02.587000 audit[3118]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11292 a0=3 a1=fffffd6aff70 a2=0 a3=ffff98ebc6c0 items=0 ppid=2143 pid=3118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:02.642286 kernel: audit: type=1325 audit(1707766862.587:732): table=filter:76 family=2 entries=32 op=nft_register_rule pid=3118 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:02.642375 kernel: audit: type=1300 audit(1707766862.587:732): arch=c00000b7 syscall=211 success=yes exit=11292 a0=3 a1=fffffd6aff70 a2=0 a3=ffff98ebc6c0 items=0 ppid=2143 pid=3118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:02.587000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:02.655265 kernel: audit: type=1327 audit(1707766862.587:732): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:02.587000 audit[3118]: NETFILTER_CFG table=nat:77 family=2 entries=22 op=nft_register_rule pid=3118 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:02.668525 kernel: audit: type=1325 audit(1707766862.587:733): table=nat:77 family=2 entries=22 op=nft_register_rule pid=3118 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:02.587000 audit[3118]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6212 a0=3 a1=fffffd6aff70 a2=0 a3=ffff98ebc6c0 items=0 ppid=2143 pid=3118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:02.587000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:02.862765 env[1347]: time="2024-02-12T19:41:02.862530592Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:aa10f60d-9ace-4fd1-9006-8b58b6f30c4e,Namespace:default,Attempt:0,}" Feb 12 19:41:02.993532 systemd-networkd[1496]: cali60e51b789ff: Link UP Feb 12 19:41:02.999860 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:41:02.999974 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali60e51b789ff: link becomes ready Feb 12 19:41:03.006127 systemd-networkd[1496]: cali60e51b789ff: Gained carrier Feb 12 19:41:03.030088 env[1347]: 2024-02-12 19:41:02.936 [INFO][3120] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.12-k8s-nfs--server--provisioner--0-eth0 nfs-server-provisioner- default aa10f60d-9ace-4fd1-9006-8b58b6f30c4e 1290 0 2024-02-12 19:41:02 +0000 UTC map[app:nfs-server-provisioner apps.kubernetes.io/pod-index:0 chart:nfs-server-provisioner-1.8.0 controller-revision-hash:nfs-server-provisioner-d5cbb7f57 heritage:Helm projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:nfs-server-provisioner release:nfs-server-provisioner statefulset.kubernetes.io/pod-name:nfs-server-provisioner-0] map[] [] [] []} {k8s 10.200.20.12 nfs-server-provisioner-0 eth0 nfs-server-provisioner [] [] [kns.default ksa.default.nfs-server-provisioner] cali60e51b789ff [{nfs TCP 2049 0 } {nfs-udp UDP 2049 0 } {nlockmgr TCP 32803 0 } {nlockmgr-udp UDP 32803 0 } {mountd TCP 20048 0 } {mountd-udp UDP 20048 0 } {rquotad TCP 875 0 } {rquotad-udp UDP 875 0 } {rpcbind TCP 111 0 } {rpcbind-udp UDP 111 0 } {statd TCP 662 0 } {statd-udp UDP 662 0 }] []}} ContainerID="a141c2bcd064eb6ccfef5c92a31b619bb954784b8604f1589585699d9af0a7ef" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.12-k8s-nfs--server--provisioner--0-" Feb 12 19:41:03.030088 env[1347]: 2024-02-12 19:41:02.937 [INFO][3120] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="a141c2bcd064eb6ccfef5c92a31b619bb954784b8604f1589585699d9af0a7ef" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.12-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:41:03.030088 env[1347]: 2024-02-12 19:41:02.958 [INFO][3132] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a141c2bcd064eb6ccfef5c92a31b619bb954784b8604f1589585699d9af0a7ef" HandleID="k8s-pod-network.a141c2bcd064eb6ccfef5c92a31b619bb954784b8604f1589585699d9af0a7ef" Workload="10.200.20.12-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:41:03.030088 env[1347]: 2024-02-12 19:41:02.970 [INFO][3132] ipam_plugin.go 268: Auto assigning IP ContainerID="a141c2bcd064eb6ccfef5c92a31b619bb954784b8604f1589585699d9af0a7ef" HandleID="k8s-pod-network.a141c2bcd064eb6ccfef5c92a31b619bb954784b8604f1589585699d9af0a7ef" Workload="10.200.20.12-k8s-nfs--server--provisioner--0-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40001184b0), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.12", "pod":"nfs-server-provisioner-0", "timestamp":"2024-02-12 19:41:02.958365908 +0000 UTC"}, Hostname:"10.200.20.12", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:41:03.030088 env[1347]: 2024-02-12 19:41:02.970 [INFO][3132] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:03.030088 env[1347]: 2024-02-12 19:41:02.970 [INFO][3132] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:03.030088 env[1347]: 2024-02-12 19:41:02.970 [INFO][3132] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.12' Feb 12 19:41:03.030088 env[1347]: 2024-02-12 19:41:02.971 [INFO][3132] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a141c2bcd064eb6ccfef5c92a31b619bb954784b8604f1589585699d9af0a7ef" host="10.200.20.12" Feb 12 19:41:03.030088 env[1347]: 2024-02-12 19:41:02.974 [INFO][3132] ipam.go 372: Looking up existing affinities for host host="10.200.20.12" Feb 12 19:41:03.030088 env[1347]: 2024-02-12 19:41:02.977 [INFO][3132] ipam.go 489: Trying affinity for 192.168.119.0/26 host="10.200.20.12" Feb 12 19:41:03.030088 env[1347]: 2024-02-12 19:41:02.979 [INFO][3132] ipam.go 155: Attempting to load block cidr=192.168.119.0/26 host="10.200.20.12" Feb 12 19:41:03.030088 env[1347]: 2024-02-12 19:41:02.980 [INFO][3132] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.119.0/26 host="10.200.20.12" Feb 12 19:41:03.030088 env[1347]: 2024-02-12 19:41:02.980 [INFO][3132] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.119.0/26 handle="k8s-pod-network.a141c2bcd064eb6ccfef5c92a31b619bb954784b8604f1589585699d9af0a7ef" host="10.200.20.12" Feb 12 19:41:03.030088 env[1347]: 2024-02-12 19:41:02.982 [INFO][3132] ipam.go 1682: Creating new handle: k8s-pod-network.a141c2bcd064eb6ccfef5c92a31b619bb954784b8604f1589585699d9af0a7ef Feb 12 19:41:03.030088 env[1347]: 2024-02-12 19:41:02.984 [INFO][3132] ipam.go 1203: Writing block in order to claim IPs block=192.168.119.0/26 handle="k8s-pod-network.a141c2bcd064eb6ccfef5c92a31b619bb954784b8604f1589585699d9af0a7ef" host="10.200.20.12" Feb 12 19:41:03.030088 env[1347]: 2024-02-12 19:41:02.988 [INFO][3132] ipam.go 1216: Successfully claimed IPs: [192.168.119.3/26] block=192.168.119.0/26 handle="k8s-pod-network.a141c2bcd064eb6ccfef5c92a31b619bb954784b8604f1589585699d9af0a7ef" host="10.200.20.12" Feb 12 19:41:03.030088 env[1347]: 2024-02-12 19:41:02.989 [INFO][3132] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.119.3/26] handle="k8s-pod-network.a141c2bcd064eb6ccfef5c92a31b619bb954784b8604f1589585699d9af0a7ef" host="10.200.20.12" Feb 12 19:41:03.030088 env[1347]: 2024-02-12 19:41:02.989 [INFO][3132] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:03.030088 env[1347]: 2024-02-12 19:41:02.989 [INFO][3132] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.119.3/26] IPv6=[] ContainerID="a141c2bcd064eb6ccfef5c92a31b619bb954784b8604f1589585699d9af0a7ef" HandleID="k8s-pod-network.a141c2bcd064eb6ccfef5c92a31b619bb954784b8604f1589585699d9af0a7ef" Workload="10.200.20.12-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:41:03.030731 env[1347]: 2024-02-12 19:41:02.990 [INFO][3120] k8s.go 385: Populated endpoint ContainerID="a141c2bcd064eb6ccfef5c92a31b619bb954784b8604f1589585699d9af0a7ef" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.12-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"aa10f60d-9ace-4fd1-9006-8b58b6f30c4e", ResourceVersion:"1290", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 41, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.12", ContainerID:"", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.119.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:03.030731 env[1347]: 2024-02-12 19:41:02.990 [INFO][3120] k8s.go 386: Calico CNI using IPs: [192.168.119.3/32] ContainerID="a141c2bcd064eb6ccfef5c92a31b619bb954784b8604f1589585699d9af0a7ef" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.12-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:41:03.030731 env[1347]: 2024-02-12 19:41:02.990 [INFO][3120] dataplane_linux.go 68: Setting the host side veth name to cali60e51b789ff ContainerID="a141c2bcd064eb6ccfef5c92a31b619bb954784b8604f1589585699d9af0a7ef" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.12-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:41:03.030731 env[1347]: 2024-02-12 19:41:03.008 [INFO][3120] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="a141c2bcd064eb6ccfef5c92a31b619bb954784b8604f1589585699d9af0a7ef" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.12-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:41:03.030905 env[1347]: 2024-02-12 19:41:03.009 [INFO][3120] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="a141c2bcd064eb6ccfef5c92a31b619bb954784b8604f1589585699d9af0a7ef" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.12-k8s-nfs--server--provisioner--0-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12-k8s-nfs--server--provisioner--0-eth0", GenerateName:"nfs-server-provisioner-", Namespace:"default", SelfLink:"", UID:"aa10f60d-9ace-4fd1-9006-8b58b6f30c4e", ResourceVersion:"1290", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 41, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nfs-server-provisioner", "apps.kubernetes.io/pod-index":"0", "chart":"nfs-server-provisioner-1.8.0", "controller-revision-hash":"nfs-server-provisioner-d5cbb7f57", "heritage":"Helm", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"nfs-server-provisioner", "release":"nfs-server-provisioner", "statefulset.kubernetes.io/pod-name":"nfs-server-provisioner-0"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.12", ContainerID:"a141c2bcd064eb6ccfef5c92a31b619bb954784b8604f1589585699d9af0a7ef", Pod:"nfs-server-provisioner-0", Endpoint:"eth0", ServiceAccountName:"nfs-server-provisioner", IPNetworks:[]string{"192.168.119.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.nfs-server-provisioner"}, InterfaceName:"cali60e51b789ff", MAC:"7a:fb:e9:91:33:13", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"nfs", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nfs-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x801, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"nlockmgr-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x8023, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"mountd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x4e50, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rquotad-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x36b, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"rpcbind-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x6f, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x296, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"statd-udp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x296, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:03.030905 env[1347]: 2024-02-12 19:41:03.028 [INFO][3120] k8s.go 491: Wrote updated endpoint to datastore ContainerID="a141c2bcd064eb6ccfef5c92a31b619bb954784b8604f1589585699d9af0a7ef" Namespace="default" Pod="nfs-server-provisioner-0" WorkloadEndpoint="10.200.20.12-k8s-nfs--server--provisioner--0-eth0" Feb 12 19:41:03.047442 env[1347]: time="2024-02-12T19:41:03.047359115Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:41:03.047442 env[1347]: time="2024-02-12T19:41:03.047399675Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:41:03.047672 env[1347]: time="2024-02-12T19:41:03.047410475Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:41:03.047929 env[1347]: time="2024-02-12T19:41:03.047874874Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a141c2bcd064eb6ccfef5c92a31b619bb954784b8604f1589585699d9af0a7ef pid=3158 runtime=io.containerd.runc.v2 Feb 12 19:41:03.068917 systemd[1]: Started cri-containerd-a141c2bcd064eb6ccfef5c92a31b619bb954784b8604f1589585699d9af0a7ef.scope. Feb 12 19:41:03.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.079000 audit: BPF prog-id=106 op=LOAD Feb 12 19:41:03.080000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.080000 audit[3168]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=3158 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:03.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131343163326263643036346562366363666566356339326133316236 Feb 12 19:41:03.080000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.080000 audit[3168]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3158 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:03.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131343163326263643036346562366363666566356339326133316236 Feb 12 19:41:03.081000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.081000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.081000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.081000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.081000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.081000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.081000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.081000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.081000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.081000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.081000 audit: BPF prog-id=107 op=LOAD Feb 12 19:41:03.081000 audit[3168]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3158 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:03.081000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131343163326263643036346562366363666566356339326133316236 Feb 12 19:41:03.081000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.081000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.081000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.081000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.081000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.081000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.081000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.081000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.081000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.081000 audit: BPF prog-id=108 op=LOAD Feb 12 19:41:03.081000 audit[3168]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3158 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:03.081000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131343163326263643036346562366363666566356339326133316236 Feb 12 19:41:03.082000 audit: BPF prog-id=108 op=UNLOAD Feb 12 19:41:03.082000 audit: BPF prog-id=107 op=UNLOAD Feb 12 19:41:03.082000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.082000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.082000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.082000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.082000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.082000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.082000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.082000 audit[3168]: AVC avc: denied { perfmon } for pid=3168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.082000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.082000 audit[3168]: AVC avc: denied { bpf } for pid=3168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.082000 audit: BPF prog-id=109 op=LOAD Feb 12 19:41:03.082000 audit[3168]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3158 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:03.082000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6131343163326263643036346562366363666566356339326133316236 Feb 12 19:41:03.103466 kubelet[1901]: E0212 19:41:03.103413 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:03.109001 env[1347]: time="2024-02-12T19:41:03.108948437Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:nfs-server-provisioner-0,Uid:aa10f60d-9ace-4fd1-9006-8b58b6f30c4e,Namespace:default,Attempt:0,} returns sandbox id \"a141c2bcd064eb6ccfef5c92a31b619bb954784b8604f1589585699d9af0a7ef\"" Feb 12 19:41:03.110820 env[1347]: time="2024-02-12T19:41:03.110691035Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\"" Feb 12 19:41:03.111000 audit[3195]: NETFILTER_CFG table=filter:78 family=2 entries=44 op=nft_register_chain pid=3195 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:41:03.111000 audit[3195]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22352 a0=3 a1=fffffec94350 a2=0 a3=ffff81a14fa8 items=0 ppid=2535 pid=3195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:03.111000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:41:03.672943 systemd[1]: run-containerd-runc-k8s.io-a141c2bcd064eb6ccfef5c92a31b619bb954784b8604f1589585699d9af0a7ef-runc.mvP6xR.mount: Deactivated successfully. Feb 12 19:41:04.104420 kubelet[1901]: E0212 19:41:04.104372 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:04.999303 systemd-networkd[1496]: cali60e51b789ff: Gained IPv6LL Feb 12 19:41:05.105502 kubelet[1901]: E0212 19:41:05.105455 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:06.106071 kubelet[1901]: E0212 19:41:06.106026 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:06.957905 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1188462143.mount: Deactivated successfully. Feb 12 19:41:07.106660 kubelet[1901]: E0212 19:41:07.106621 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:08.106909 kubelet[1901]: E0212 19:41:08.106871 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:09.014791 env[1347]: time="2024-02-12T19:41:09.014730907Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:09.024772 env[1347]: time="2024-02-12T19:41:09.024721416Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:09.030471 env[1347]: time="2024-02-12T19:41:09.030440049Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:09.036443 env[1347]: time="2024-02-12T19:41:09.036400523Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/sig-storage/nfs-provisioner@sha256:c825f3d5e28bde099bd7a3daace28772d412c9157ad47fa752a9ad0baafc118d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:09.037250 env[1347]: time="2024-02-12T19:41:09.037218402Z" level=info msg="PullImage \"registry.k8s.io/sig-storage/nfs-provisioner:v4.0.8\" returns image reference \"sha256:5a42a519e0a8cf95c3c5f18f767c58c8c8b072aaea0a26e5e47a6f206c7df685\"" Feb 12 19:41:09.039993 env[1347]: time="2024-02-12T19:41:09.039948959Z" level=info msg="CreateContainer within sandbox \"a141c2bcd064eb6ccfef5c92a31b619bb954784b8604f1589585699d9af0a7ef\" for container &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,}" Feb 12 19:41:09.072929 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4147382806.mount: Deactivated successfully. Feb 12 19:41:09.078424 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount232896063.mount: Deactivated successfully. Feb 12 19:41:09.098191 env[1347]: time="2024-02-12T19:41:09.098144333Z" level=info msg="CreateContainer within sandbox \"a141c2bcd064eb6ccfef5c92a31b619bb954784b8604f1589585699d9af0a7ef\" for &ContainerMetadata{Name:nfs-server-provisioner,Attempt:0,} returns container id \"1a97816f7b7ca192a842b4833b9a9c11fa5e6539a7fce1acdf42280efede6815\"" Feb 12 19:41:09.098941 env[1347]: time="2024-02-12T19:41:09.098895092Z" level=info msg="StartContainer for \"1a97816f7b7ca192a842b4833b9a9c11fa5e6539a7fce1acdf42280efede6815\"" Feb 12 19:41:09.107805 kubelet[1901]: E0212 19:41:09.107773 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:09.116355 systemd[1]: Started cri-containerd-1a97816f7b7ca192a842b4833b9a9c11fa5e6539a7fce1acdf42280efede6815.scope. Feb 12 19:41:09.140766 kernel: kauditd_printk_skb: 62 callbacks suppressed Feb 12 19:41:09.140876 kernel: audit: type=1400 audit(1707766869.129:753): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.180261 kernel: audit: type=1400 audit(1707766869.129:754): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.198623 kernel: audit: type=1400 audit(1707766869.129:755): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.223415 kernel: audit: type=1400 audit(1707766869.129:756): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.241410 kernel: audit: type=1400 audit(1707766869.129:757): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.259266 kernel: audit: type=1400 audit(1707766869.129:758): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.261792 kernel: audit: type=1400 audit(1707766869.129:759): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.299496 kernel: audit: type=1400 audit(1707766869.129:760): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.299601 kernel: audit: type=1400 audit(1707766869.129:761): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.318713 env[1347]: time="2024-02-12T19:41:09.318679126Z" level=info msg="StartContainer for \"1a97816f7b7ca192a842b4833b9a9c11fa5e6539a7fce1acdf42280efede6815\" returns successfully" Feb 12 19:41:09.336212 kernel: audit: type=1400 audit(1707766869.139:762): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.139000 audit: BPF prog-id=110 op=LOAD Feb 12 19:41:09.157000 audit[3213]: AVC avc: denied { bpf } for pid=3213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.157000 audit[3213]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3158 pid=3213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:09.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161393738313666376237636131393261383432623438333362396139 Feb 12 19:41:09.157000 audit[3213]: AVC avc: denied { perfmon } for pid=3213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.157000 audit[3213]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3158 pid=3213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:09.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161393738313666376237636131393261383432623438333362396139 Feb 12 19:41:09.157000 audit[3213]: AVC avc: denied { bpf } for pid=3213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.157000 audit[3213]: AVC avc: denied { bpf } for pid=3213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.157000 audit[3213]: AVC avc: denied { bpf } for pid=3213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.157000 audit[3213]: AVC avc: denied { perfmon } for pid=3213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.157000 audit[3213]: AVC avc: denied { perfmon } for pid=3213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.157000 audit[3213]: AVC avc: denied { perfmon } for pid=3213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.157000 audit[3213]: AVC avc: denied { perfmon } for pid=3213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.157000 audit[3213]: AVC avc: denied { perfmon } for pid=3213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.157000 audit[3213]: AVC avc: denied { bpf } for pid=3213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.157000 audit[3213]: AVC avc: denied { bpf } for pid=3213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.157000 audit: BPF prog-id=111 op=LOAD Feb 12 19:41:09.157000 audit[3213]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3158 pid=3213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:09.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161393738313666376237636131393261383432623438333362396139 Feb 12 19:41:09.157000 audit[3213]: AVC avc: denied { bpf } for pid=3213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.157000 audit[3213]: AVC avc: denied { bpf } for pid=3213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.157000 audit[3213]: AVC avc: denied { perfmon } for pid=3213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.157000 audit[3213]: AVC avc: denied { perfmon } for pid=3213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.157000 audit[3213]: AVC avc: denied { perfmon } for pid=3213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.157000 audit[3213]: AVC avc: denied { perfmon } for pid=3213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.157000 audit[3213]: AVC avc: denied { perfmon } for pid=3213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.157000 audit[3213]: AVC avc: denied { bpf } for pid=3213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.157000 audit[3213]: AVC avc: denied { bpf } for pid=3213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.157000 audit: BPF prog-id=112 op=LOAD Feb 12 19:41:09.157000 audit[3213]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3158 pid=3213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:09.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161393738313666376237636131393261383432623438333362396139 Feb 12 19:41:09.157000 audit: BPF prog-id=112 op=UNLOAD Feb 12 19:41:09.157000 audit: BPF prog-id=111 op=UNLOAD Feb 12 19:41:09.157000 audit[3213]: AVC avc: denied { bpf } for pid=3213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.157000 audit[3213]: AVC avc: denied { bpf } for pid=3213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.157000 audit[3213]: AVC avc: denied { bpf } for pid=3213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.157000 audit[3213]: AVC avc: denied { perfmon } for pid=3213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.157000 audit[3213]: AVC avc: denied { perfmon } for pid=3213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.157000 audit[3213]: AVC avc: denied { perfmon } for pid=3213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.157000 audit[3213]: AVC avc: denied { perfmon } for pid=3213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.157000 audit[3213]: AVC avc: denied { perfmon } for pid=3213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.157000 audit[3213]: AVC avc: denied { bpf } for pid=3213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.157000 audit[3213]: AVC avc: denied { bpf } for pid=3213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.157000 audit: BPF prog-id=113 op=LOAD Feb 12 19:41:09.157000 audit[3213]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3158 pid=3213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:09.157000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161393738313666376237636131393261383432623438333362396139 Feb 12 19:41:09.322000 audit[3243]: AVC avc: denied { search } for pid=3243 comm="rpcbind" name="crypto" dev="proc" ino=21279 scontext=system_u:system_r:svirt_lxc_net_t:s0:c91,c336 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 19:41:09.322000 audit[3243]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffaa6ff000 a2=0 a3=0 items=0 ppid=3224 pid=3243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="rpcbind" exe="/usr/bin/rpcbind" subj=system_u:system_r:svirt_lxc_net_t:s0:c91,c336 key=(null) Feb 12 19:41:09.322000 audit: PROCTITLE proctitle=2F7573722F7362696E2F72706362696E64002D77 Feb 12 19:41:09.365000 audit[3248]: AVC avc: denied { search } for pid=3248 comm="dbus-daemon" name="crypto" dev="proc" ino=21279 scontext=system_u:system_r:svirt_lxc_net_t:s0:c91,c336 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 19:41:09.365000 audit[3248]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffffb760f000 a2=0 a3=0 items=0 ppid=3224 pid=3248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c91,c336 key=(null) Feb 12 19:41:09.365000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 12 19:41:09.368000 audit[3249]: AVC avc: denied { watch } for pid=3249 comm="dbus-daemon" path="/usr/share/dbus-1/system.d" dev="overlay" ino=537978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c91,c336 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c91,c336 tclass=dir permissive=0 Feb 12 19:41:09.368000 audit[3249]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6 a1=aaab18b24380 a2=2c8 a3=aaab18b0fa60 items=0 ppid=3224 pid=3249 auid=4294967295 uid=81 gid=81 euid=81 suid=81 fsuid=81 egid=81 sgid=81 fsgid=81 tty=(none) ses=4294967295 comm="dbus-daemon" exe="/usr/bin/dbus-daemon" subj=system_u:system_r:svirt_lxc_net_t:s0:c91,c336 key=(null) Feb 12 19:41:09.368000 audit: PROCTITLE proctitle=646275732D6461656D6F6E002D2D73797374656D002D2D6E6F70696466696C65 Feb 12 19:41:09.372000 audit[3250]: AVC avc: denied { read } for pid=3250 comm="ganesha.nfsd" name="overcommit_memory" dev="proc" ino=20371 scontext=system_u:system_r:svirt_lxc_net_t:s0:c91,c336 tcontext=system_u:object_r:sysctl_vm_overcommit_t:s0 tclass=file permissive=0 Feb 12 19:41:09.372000 audit[3250]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffff9c a1=ffff857da570 a2=80000 a3=0 items=0 ppid=3224 pid=3250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c91,c336 key=(null) Feb 12 19:41:09.372000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 12 19:41:09.373000 audit[3250]: AVC avc: denied { search } for pid=3250 comm="ganesha.nfsd" name="crypto" dev="proc" ino=21279 scontext=system_u:system_r:svirt_lxc_net_t:s0:c91,c336 tcontext=system_u:object_r:sysctl_crypto_t:s0 tclass=dir permissive=0 Feb 12 19:41:09.373000 audit[3250]: SYSCALL arch=c00000b7 syscall=56 success=no exit=-13 a0=ffffffffffffff9c a1=ffff84b6f000 a2=0 a3=0 items=0 ppid=3224 pid=3250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ganesha.nfsd" exe="/usr/local/bin/ganesha.nfsd" subj=system_u:system_r:svirt_lxc_net_t:s0:c91,c336 key=(null) Feb 12 19:41:09.373000 audit: PROCTITLE proctitle=67616E657368612E6E667364002D46002D4C002F6578706F72742F67616E657368612E6C6F67002D70002F7661722F72756E2F67616E657368612E706964002D66002F6578706F72742F7666732E636F6E66 Feb 12 19:41:10.107911 kubelet[1901]: E0212 19:41:10.107858 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:10.332031 kubelet[1901]: I0212 19:41:10.331921 1901 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="default/nfs-server-provisioner-0" podStartSLOduration=2.404748309 podCreationTimestamp="2024-02-12 19:41:02 +0000 UTC" firstStartedPulling="2024-02-12 19:41:03.110386675 +0000 UTC m=+44.496453464" lastFinishedPulling="2024-02-12 19:41:09.037512321 +0000 UTC m=+50.423579110" observedRunningTime="2024-02-12 19:41:10.331865395 +0000 UTC m=+51.717932184" watchObservedRunningTime="2024-02-12 19:41:10.331873955 +0000 UTC m=+51.717940744" Feb 12 19:41:10.344000 audit[3255]: NETFILTER_CFG table=filter:79 family=2 entries=20 op=nft_register_rule pid=3255 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:10.344000 audit[3255]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffdcc04240 a2=0 a3=ffff977656c0 items=0 ppid=2143 pid=3255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:10.344000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:10.347000 audit[3255]: NETFILTER_CFG table=nat:80 family=2 entries=106 op=nft_register_chain pid=3255 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:10.347000 audit[3255]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=48164 a0=3 a1=ffffdcc04240 a2=0 a3=ffff977656c0 items=0 ppid=2143 pid=3255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:10.347000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:11.107997 kubelet[1901]: E0212 19:41:11.107956 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:12.108859 kubelet[1901]: E0212 19:41:12.108823 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:13.109575 kubelet[1901]: E0212 19:41:13.109547 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:14.110965 kubelet[1901]: E0212 19:41:14.110931 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:15.111825 kubelet[1901]: E0212 19:41:15.111785 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:15.669139 systemd[1]: run-containerd-runc-k8s.io-660f1f1367f6b3bc7298080bc1c9a1c3390560fcc89fd5189c0f999e88084abb-runc.EHuFiU.mount: Deactivated successfully. Feb 12 19:41:16.112459 kubelet[1901]: E0212 19:41:16.112434 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:17.113108 kubelet[1901]: E0212 19:41:17.113075 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:18.113798 kubelet[1901]: E0212 19:41:18.113765 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:19.078626 kubelet[1901]: E0212 19:41:19.078595 1901 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:19.086396 env[1347]: time="2024-02-12T19:41:19.086295231Z" level=info msg="StopPodSandbox for \"7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29\"" Feb 12 19:41:19.114914 kubelet[1901]: E0212 19:41:19.114868 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:19.165799 env[1347]: 2024-02-12 19:41:19.133 [WARNING][3293] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12-k8s-csi--node--driver--xlm9b-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5067e866-4534-40f4-9993-6dcb1c81e037", ResourceVersion:"1262", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.12", ContainerID:"7147364b4e8f6f7ef0db97996b3809b84ffefc74f4f93bf8bdb750b8ee1d9646", Pod:"csi-node-driver-xlm9b", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.119.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali615cc29472a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:19.165799 env[1347]: 2024-02-12 19:41:19.134 [INFO][3293] k8s.go 578: Cleaning up netns ContainerID="7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29" Feb 12 19:41:19.165799 env[1347]: 2024-02-12 19:41:19.134 [INFO][3293] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29" iface="eth0" netns="" Feb 12 19:41:19.165799 env[1347]: 2024-02-12 19:41:19.134 [INFO][3293] k8s.go 585: Releasing IP address(es) ContainerID="7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29" Feb 12 19:41:19.165799 env[1347]: 2024-02-12 19:41:19.134 [INFO][3293] utils.go 188: Calico CNI releasing IP address ContainerID="7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29" Feb 12 19:41:19.165799 env[1347]: 2024-02-12 19:41:19.150 [INFO][3299] ipam_plugin.go 415: Releasing address using handleID ContainerID="7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29" HandleID="k8s-pod-network.7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29" Workload="10.200.20.12-k8s-csi--node--driver--xlm9b-eth0" Feb 12 19:41:19.165799 env[1347]: 2024-02-12 19:41:19.150 [INFO][3299] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:19.165799 env[1347]: 2024-02-12 19:41:19.150 [INFO][3299] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:19.165799 env[1347]: 2024-02-12 19:41:19.161 [WARNING][3299] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29" HandleID="k8s-pod-network.7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29" Workload="10.200.20.12-k8s-csi--node--driver--xlm9b-eth0" Feb 12 19:41:19.165799 env[1347]: 2024-02-12 19:41:19.161 [INFO][3299] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29" HandleID="k8s-pod-network.7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29" Workload="10.200.20.12-k8s-csi--node--driver--xlm9b-eth0" Feb 12 19:41:19.165799 env[1347]: 2024-02-12 19:41:19.162 [INFO][3299] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:19.165799 env[1347]: 2024-02-12 19:41:19.164 [INFO][3293] k8s.go 591: Teardown processing complete. ContainerID="7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29" Feb 12 19:41:19.165799 env[1347]: time="2024-02-12T19:41:19.165782397Z" level=info msg="TearDown network for sandbox \"7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29\" successfully" Feb 12 19:41:19.166245 env[1347]: time="2024-02-12T19:41:19.165818077Z" level=info msg="StopPodSandbox for \"7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29\" returns successfully" Feb 12 19:41:19.166762 env[1347]: time="2024-02-12T19:41:19.166721436Z" level=info msg="RemovePodSandbox for \"7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29\"" Feb 12 19:41:19.166882 env[1347]: time="2024-02-12T19:41:19.166847596Z" level=info msg="Forcibly stopping sandbox \"7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29\"" Feb 12 19:41:19.257601 env[1347]: 2024-02-12 19:41:19.199 [WARNING][3318] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12-k8s-csi--node--driver--xlm9b-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5067e866-4534-40f4-9993-6dcb1c81e037", ResourceVersion:"1262", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.12", ContainerID:"7147364b4e8f6f7ef0db97996b3809b84ffefc74f4f93bf8bdb750b8ee1d9646", Pod:"csi-node-driver-xlm9b", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.119.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali615cc29472a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:19.257601 env[1347]: 2024-02-12 19:41:19.199 [INFO][3318] k8s.go 578: Cleaning up netns ContainerID="7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29" Feb 12 19:41:19.257601 env[1347]: 2024-02-12 19:41:19.199 [INFO][3318] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29" iface="eth0" netns="" Feb 12 19:41:19.257601 env[1347]: 2024-02-12 19:41:19.199 [INFO][3318] k8s.go 585: Releasing IP address(es) ContainerID="7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29" Feb 12 19:41:19.257601 env[1347]: 2024-02-12 19:41:19.199 [INFO][3318] utils.go 188: Calico CNI releasing IP address ContainerID="7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29" Feb 12 19:41:19.257601 env[1347]: 2024-02-12 19:41:19.229 [INFO][3325] ipam_plugin.go 415: Releasing address using handleID ContainerID="7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29" HandleID="k8s-pod-network.7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29" Workload="10.200.20.12-k8s-csi--node--driver--xlm9b-eth0" Feb 12 19:41:19.257601 env[1347]: 2024-02-12 19:41:19.229 [INFO][3325] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:19.257601 env[1347]: 2024-02-12 19:41:19.229 [INFO][3325] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:19.257601 env[1347]: 2024-02-12 19:41:19.254 [WARNING][3325] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29" HandleID="k8s-pod-network.7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29" Workload="10.200.20.12-k8s-csi--node--driver--xlm9b-eth0" Feb 12 19:41:19.257601 env[1347]: 2024-02-12 19:41:19.254 [INFO][3325] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29" HandleID="k8s-pod-network.7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29" Workload="10.200.20.12-k8s-csi--node--driver--xlm9b-eth0" Feb 12 19:41:19.257601 env[1347]: 2024-02-12 19:41:19.255 [INFO][3325] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:19.257601 env[1347]: 2024-02-12 19:41:19.256 [INFO][3318] k8s.go 591: Teardown processing complete. ContainerID="7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29" Feb 12 19:41:19.258162 env[1347]: time="2024-02-12T19:41:19.258130270Z" level=info msg="TearDown network for sandbox \"7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29\" successfully" Feb 12 19:41:19.266848 env[1347]: time="2024-02-12T19:41:19.266807621Z" level=info msg="RemovePodSandbox \"7f160d751a7f007e2acbcc32d08bf1da681f8840f900e1aba92cc3879f9f5f29\" returns successfully" Feb 12 19:41:19.267643 env[1347]: time="2024-02-12T19:41:19.267616781Z" level=info msg="StopPodSandbox for \"8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621\"" Feb 12 19:41:19.333658 env[1347]: 2024-02-12 19:41:19.301 [WARNING][3347] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12-k8s-nginx--deployment--6d5f899847--m94l7-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"dfd4dd87-ec69-4e3d-99ec-24f4279ddff1", ResourceVersion:"1243", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.12", ContainerID:"84a559e2d0b8cfec088dc4bb3fa4cca002214e554282761058c744ec34e80e4b", Pod:"nginx-deployment-6d5f899847-m94l7", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.119.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calia3beb929c6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:19.333658 env[1347]: 2024-02-12 19:41:19.301 [INFO][3347] k8s.go 578: Cleaning up netns ContainerID="8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621" Feb 12 19:41:19.333658 env[1347]: 2024-02-12 19:41:19.301 [INFO][3347] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621" iface="eth0" netns="" Feb 12 19:41:19.333658 env[1347]: 2024-02-12 19:41:19.301 [INFO][3347] k8s.go 585: Releasing IP address(es) ContainerID="8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621" Feb 12 19:41:19.333658 env[1347]: 2024-02-12 19:41:19.301 [INFO][3347] utils.go 188: Calico CNI releasing IP address ContainerID="8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621" Feb 12 19:41:19.333658 env[1347]: 2024-02-12 19:41:19.317 [INFO][3353] ipam_plugin.go 415: Releasing address using handleID ContainerID="8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621" HandleID="k8s-pod-network.8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621" Workload="10.200.20.12-k8s-nginx--deployment--6d5f899847--m94l7-eth0" Feb 12 19:41:19.333658 env[1347]: 2024-02-12 19:41:19.317 [INFO][3353] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:19.333658 env[1347]: 2024-02-12 19:41:19.317 [INFO][3353] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:19.333658 env[1347]: 2024-02-12 19:41:19.329 [WARNING][3353] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621" HandleID="k8s-pod-network.8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621" Workload="10.200.20.12-k8s-nginx--deployment--6d5f899847--m94l7-eth0" Feb 12 19:41:19.333658 env[1347]: 2024-02-12 19:41:19.329 [INFO][3353] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621" HandleID="k8s-pod-network.8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621" Workload="10.200.20.12-k8s-nginx--deployment--6d5f899847--m94l7-eth0" Feb 12 19:41:19.333658 env[1347]: 2024-02-12 19:41:19.330 [INFO][3353] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:19.333658 env[1347]: 2024-02-12 19:41:19.331 [INFO][3347] k8s.go 591: Teardown processing complete. ContainerID="8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621" Feb 12 19:41:19.333658 env[1347]: time="2024-02-12T19:41:19.332565679Z" level=info msg="TearDown network for sandbox \"8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621\" successfully" Feb 12 19:41:19.333658 env[1347]: time="2024-02-12T19:41:19.332594919Z" level=info msg="StopPodSandbox for \"8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621\" returns successfully" Feb 12 19:41:19.334294 env[1347]: time="2024-02-12T19:41:19.334267838Z" level=info msg="RemovePodSandbox for \"8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621\"" Feb 12 19:41:19.334467 env[1347]: time="2024-02-12T19:41:19.334388958Z" level=info msg="Forcibly stopping sandbox \"8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621\"" Feb 12 19:41:19.403471 env[1347]: 2024-02-12 19:41:19.370 [WARNING][3373] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12-k8s-nginx--deployment--6d5f899847--m94l7-eth0", GenerateName:"nginx-deployment-6d5f899847-", Namespace:"default", SelfLink:"", UID:"dfd4dd87-ec69-4e3d-99ec-24f4279ddff1", ResourceVersion:"1243", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app":"nginx", "pod-template-hash":"6d5f899847", "projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.12", ContainerID:"84a559e2d0b8cfec088dc4bb3fa4cca002214e554282761058c744ec34e80e4b", Pod:"nginx-deployment-6d5f899847-m94l7", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.119.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"calia3beb929c6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:19.403471 env[1347]: 2024-02-12 19:41:19.370 [INFO][3373] k8s.go 578: Cleaning up netns ContainerID="8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621" Feb 12 19:41:19.403471 env[1347]: 2024-02-12 19:41:19.370 [INFO][3373] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621" iface="eth0" netns="" Feb 12 19:41:19.403471 env[1347]: 2024-02-12 19:41:19.370 [INFO][3373] k8s.go 585: Releasing IP address(es) ContainerID="8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621" Feb 12 19:41:19.403471 env[1347]: 2024-02-12 19:41:19.370 [INFO][3373] utils.go 188: Calico CNI releasing IP address ContainerID="8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621" Feb 12 19:41:19.403471 env[1347]: 2024-02-12 19:41:19.389 [INFO][3379] ipam_plugin.go 415: Releasing address using handleID ContainerID="8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621" HandleID="k8s-pod-network.8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621" Workload="10.200.20.12-k8s-nginx--deployment--6d5f899847--m94l7-eth0" Feb 12 19:41:19.403471 env[1347]: 2024-02-12 19:41:19.389 [INFO][3379] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:19.403471 env[1347]: 2024-02-12 19:41:19.390 [INFO][3379] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:19.403471 env[1347]: 2024-02-12 19:41:19.399 [WARNING][3379] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621" HandleID="k8s-pod-network.8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621" Workload="10.200.20.12-k8s-nginx--deployment--6d5f899847--m94l7-eth0" Feb 12 19:41:19.403471 env[1347]: 2024-02-12 19:41:19.399 [INFO][3379] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621" HandleID="k8s-pod-network.8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621" Workload="10.200.20.12-k8s-nginx--deployment--6d5f899847--m94l7-eth0" Feb 12 19:41:19.403471 env[1347]: 2024-02-12 19:41:19.401 [INFO][3379] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:19.403471 env[1347]: 2024-02-12 19:41:19.402 [INFO][3373] k8s.go 591: Teardown processing complete. ContainerID="8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621" Feb 12 19:41:19.404002 env[1347]: time="2024-02-12T19:41:19.403968812Z" level=info msg="TearDown network for sandbox \"8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621\" successfully" Feb 12 19:41:19.410574 env[1347]: time="2024-02-12T19:41:19.410536006Z" level=info msg="RemovePodSandbox \"8eb6614986fa38af9edadb9deea5572952e573a6c9dcf386ce73be1506b79621\" returns successfully" Feb 12 19:41:20.115137 kubelet[1901]: E0212 19:41:20.115086 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:21.115977 kubelet[1901]: E0212 19:41:21.115942 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:22.116661 kubelet[1901]: E0212 19:41:22.116632 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:23.117514 kubelet[1901]: E0212 19:41:23.117475 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:24.117989 kubelet[1901]: E0212 19:41:24.117956 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:25.118658 kubelet[1901]: E0212 19:41:25.118623 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:26.119163 kubelet[1901]: E0212 19:41:26.119130 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:27.119649 kubelet[1901]: E0212 19:41:27.119618 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:28.120450 kubelet[1901]: E0212 19:41:28.120416 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:29.121525 kubelet[1901]: E0212 19:41:29.121490 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:30.122176 kubelet[1901]: E0212 19:41:30.122147 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:31.122908 kubelet[1901]: E0212 19:41:31.122872 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:32.123825 kubelet[1901]: E0212 19:41:32.123791 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:33.124330 kubelet[1901]: E0212 19:41:33.124292 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:33.549307 kubelet[1901]: I0212 19:41:33.548997 1901 topology_manager.go:215] "Topology Admit Handler" podUID="3611ca90-1fb9-4cca-af7c-dacec6540304" podNamespace="default" podName="test-pod-1" Feb 12 19:41:33.553399 systemd[1]: Created slice kubepods-besteffort-pod3611ca90_1fb9_4cca_af7c_dacec6540304.slice. Feb 12 19:41:33.715071 kubelet[1901]: I0212 19:41:33.715027 1901 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nl9ng\" (UniqueName: \"kubernetes.io/projected/3611ca90-1fb9-4cca-af7c-dacec6540304-kube-api-access-nl9ng\") pod \"test-pod-1\" (UID: \"3611ca90-1fb9-4cca-af7c-dacec6540304\") " pod="default/test-pod-1" Feb 12 19:41:33.715253 kubelet[1901]: I0212 19:41:33.715084 1901 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"pvc-5b5c43e0-2640-4591-a167-f1942ae5f007\" (UniqueName: \"kubernetes.io/nfs/3611ca90-1fb9-4cca-af7c-dacec6540304-pvc-5b5c43e0-2640-4591-a167-f1942ae5f007\") pod \"test-pod-1\" (UID: \"3611ca90-1fb9-4cca-af7c-dacec6540304\") " pod="default/test-pod-1" Feb 12 19:41:33.945000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:33.953733 kernel: kauditd_printk_skb: 68 callbacks suppressed Feb 12 19:41:33.953838 kernel: audit: type=1400 audit(1707766893.945:778): avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:33.953870 kernel: Failed to create system directory netfs Feb 12 19:41:33.945000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.001497 kernel: Failed to create system directory netfs Feb 12 19:41:34.001604 kernel: audit: type=1400 audit(1707766893.945:778): avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.001638 kernel: Failed to create system directory netfs Feb 12 19:41:33.945000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.024641 kernel: audit: type=1400 audit(1707766893.945:778): avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.024760 kernel: Failed to create system directory netfs Feb 12 19:41:33.945000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.029922 kernel: audit: type=1400 audit(1707766893.945:778): avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:33.945000 audit[3415]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf6bb55e0 a1=12c14 a2=aaaacf9be028 a3=aaaaf6ba6010 items=0 ppid=51 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:34.078138 kernel: audit: type=1300 audit(1707766893.945:778): arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf6bb55e0 a1=12c14 a2=aaaacf9be028 a3=aaaaf6ba6010 items=0 ppid=51 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:33.945000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:41:34.087374 kernel: audit: type=1327 audit(1707766893.945:778): proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:41:34.124692 kubelet[1901]: E0212 19:41:34.124655 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:34.133000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.165999 kernel: Failed to create system directory fscache Feb 12 19:41:34.166081 kernel: audit: type=1400 audit(1707766894.133:779): avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.166111 kernel: Failed to create system directory fscache Feb 12 19:41:34.166127 kernel: audit: type=1400 audit(1707766894.133:779): avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.133000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.190160 kernel: Failed to create system directory fscache Feb 12 19:41:34.190269 kernel: audit: type=1400 audit(1707766894.133:779): avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.133000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.213823 kernel: Failed to create system directory fscache Feb 12 19:41:34.213929 kernel: audit: type=1400 audit(1707766894.133:779): avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.133000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.233103 kernel: Failed to create system directory fscache Feb 12 19:41:34.133000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.133000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.241956 kernel: Failed to create system directory fscache Feb 12 19:41:34.133000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.246595 kernel: Failed to create system directory fscache Feb 12 19:41:34.246685 kernel: Failed to create system directory fscache Feb 12 19:41:34.133000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.133000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.255409 kernel: Failed to create system directory fscache Feb 12 19:41:34.255469 kernel: Failed to create system directory fscache Feb 12 19:41:34.133000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.133000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.264235 kernel: Failed to create system directory fscache Feb 12 19:41:34.264285 kernel: Failed to create system directory fscache Feb 12 19:41:34.133000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.133000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.272762 kernel: Failed to create system directory fscache Feb 12 19:41:34.272815 kernel: Failed to create system directory fscache Feb 12 19:41:34.133000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.281103 kernel: FS-Cache: Loaded Feb 12 19:41:34.133000 audit[3415]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf6dc8210 a1=4c344 a2=aaaacf9be028 a3=aaaaf6ba6010 items=0 ppid=51 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:34.133000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.393815 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.393898 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.393920 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.403348 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.403412 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.407717 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.416154 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.416201 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.424778 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.424812 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.432802 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.432833 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.441183 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.441223 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.449185 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.449246 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.457108 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.457160 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.464856 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.464907 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.473840 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.473886 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.481792 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.481845 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.489571 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.493662 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.493707 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.501777 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.501837 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.509900 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.509979 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.517682 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.517728 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.525206 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.525250 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.533076 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.533129 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.540373 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.544166 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.548159 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.548202 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.555354 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.555447 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.562917 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.563062 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.570388 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.570451 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.574015 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.581948 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.582021 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.589129 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.589221 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.596459 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.600388 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.600465 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.604248 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.611841 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.611919 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.619202 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.619260 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.626898 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.626953 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.630687 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.638465 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.638550 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.645795 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.645858 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.653526 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.653573 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.661003 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.661068 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.668292 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.668358 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.672304 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.679680 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.679750 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.683358 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.690541 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.690616 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.697652 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.697715 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.701768 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.708901 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.708971 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.716026 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.716096 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.723543 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.724025 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.731238 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.731306 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.739091 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.739168 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.746626 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.746688 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.750554 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.758284 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.758350 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.765653 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.769371 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.769455 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.776509 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.776577 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.784368 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.784438 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.787943 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.791564 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.799380 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.799441 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.806896 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.811091 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.811175 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.818713 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.818793 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.822473 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.826696 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.835021 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.835057 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.842397 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.842513 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.849670 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.849730 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.853502 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.856851 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.864654 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.868668 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.868781 kernel: Failed to create system directory sunrpc Feb 12 19:41:34.378000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:34.884006 kernel: RPC: Registered named UNIX socket transport module. Feb 12 19:41:34.884101 kernel: RPC: Registered udp transport module. Feb 12 19:41:34.884131 kernel: RPC: Registered tcp transport module. Feb 12 19:41:34.887446 kernel: RPC: Registered tcp NFSv4.1 backchannel transport module. Feb 12 19:41:34.378000 audit[3415]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf6e14560 a1=fbb6c a2=aaaacf9be028 a3=aaaaf6ba6010 items=6 ppid=51 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:34.378000 audit: CWD cwd="/" Feb 12 19:41:34.378000 audit: PATH item=0 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:34.378000 audit: PATH item=1 name=(null) inode=21782 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:34.378000 audit: PATH item=2 name=(null) inode=21782 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:34.378000 audit: PATH item=3 name=(null) inode=21783 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:34.378000 audit: PATH item=4 name=(null) inode=21782 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:34.378000 audit: PATH item=5 name=(null) inode=21784 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:41:34.378000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.043874 kernel: Failed to create system directory nfs Feb 12 19:41:35.043910 kernel: Failed to create system directory nfs Feb 12 19:41:35.043947 kernel: Failed to create system directory nfs Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.051420 kernel: Failed to create system directory nfs Feb 12 19:41:35.051479 kernel: Failed to create system directory nfs Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.058792 kernel: Failed to create system directory nfs Feb 12 19:41:35.058830 kernel: Failed to create system directory nfs Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.066263 kernel: Failed to create system directory nfs Feb 12 19:41:35.066306 kernel: Failed to create system directory nfs Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.073532 kernel: Failed to create system directory nfs Feb 12 19:41:35.073564 kernel: Failed to create system directory nfs Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.080999 kernel: Failed to create system directory nfs Feb 12 19:41:35.081063 kernel: Failed to create system directory nfs Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.088193 kernel: Failed to create system directory nfs Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.092207 kernel: Failed to create system directory nfs Feb 12 19:41:35.092271 kernel: Failed to create system directory nfs Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.099456 kernel: Failed to create system directory nfs Feb 12 19:41:35.099486 kernel: Failed to create system directory nfs Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.106429 kernel: Failed to create system directory nfs Feb 12 19:41:35.106490 kernel: Failed to create system directory nfs Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.113523 kernel: Failed to create system directory nfs Feb 12 19:41:35.113582 kernel: Failed to create system directory nfs Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.120525 kernel: Failed to create system directory nfs Feb 12 19:41:35.120557 kernel: Failed to create system directory nfs Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.124006 kernel: Failed to create system directory nfs Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.125699 kubelet[1901]: E0212 19:41:35.125647 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:35.127774 kernel: Failed to create system directory nfs Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.135154 kernel: Failed to create system directory nfs Feb 12 19:41:35.135183 kernel: Failed to create system directory nfs Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.142596 kernel: Failed to create system directory nfs Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.146863 kernel: Failed to create system directory nfs Feb 12 19:41:35.146906 kernel: Failed to create system directory nfs Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.154123 kernel: Failed to create system directory nfs Feb 12 19:41:35.154166 kernel: Failed to create system directory nfs Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.161614 kernel: Failed to create system directory nfs Feb 12 19:41:35.161642 kernel: Failed to create system directory nfs Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.168693 kernel: Failed to create system directory nfs Feb 12 19:41:35.168724 kernel: Failed to create system directory nfs Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.175830 kernel: Failed to create system directory nfs Feb 12 19:41:35.175872 kernel: Failed to create system directory nfs Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.182974 kernel: Failed to create system directory nfs Feb 12 19:41:35.183002 kernel: Failed to create system directory nfs Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.189980 kernel: Failed to create system directory nfs Feb 12 19:41:35.190018 kernel: Failed to create system directory nfs Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.196974 kernel: Failed to create system directory nfs Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.202507 kernel: Failed to create system directory nfs Feb 12 19:41:35.202572 kernel: Failed to create system directory nfs Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.208182 kernel: Failed to create system directory nfs Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.211688 kernel: Failed to create system directory nfs Feb 12 19:41:35.211791 kernel: Failed to create system directory nfs Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.218509 kernel: Failed to create system directory nfs Feb 12 19:41:35.218581 kernel: Failed to create system directory nfs Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.226748 kernel: Failed to create system directory nfs Feb 12 19:41:35.226825 kernel: Failed to create system directory nfs Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.233681 kernel: Failed to create system directory nfs Feb 12 19:41:35.233761 kernel: Failed to create system directory nfs Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.240695 kernel: Failed to create system directory nfs Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.244233 kernel: Failed to create system directory nfs Feb 12 19:41:35.244278 kernel: Failed to create system directory nfs Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.247647 kernel: Failed to create system directory nfs Feb 12 19:41:35.031000 audit[3415]: AVC avc: denied { confidentiality } for pid=3415 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.263819 kernel: FS-Cache: Netfs 'nfs' registered for caching Feb 12 19:41:35.031000 audit[3415]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf6f40b40 a1=ae35c a2=aaaacf9be028 a3=aaaaf6ba6010 items=0 ppid=51 pid=3415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:35.031000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D0066732D6E6673 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.360956 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.361012 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.361054 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.369375 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.369466 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.376342 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.376402 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.383768 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.383797 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.391069 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.391136 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.398468 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.398503 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.405947 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.409988 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.410017 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.417292 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.421190 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.421254 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.428526 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.428572 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.435862 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.435922 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.443399 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.443438 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.450727 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.450785 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.458410 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.463055 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.463083 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.470668 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.470700 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.478535 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.478582 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.486166 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.486218 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.493558 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.493609 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.500902 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.500933 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.508807 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.512910 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.512936 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.520360 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.520421 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.528330 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.528392 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.535829 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.535880 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.543521 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.543558 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.550773 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.550821 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.558129 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.558158 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.565653 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.565698 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.573202 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.573261 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.576784 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.583906 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.583946 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.587622 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.594720 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.594827 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.602308 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.602337 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.610027 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.610071 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.617680 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.617734 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.624988 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.625014 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.632450 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.632478 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.639763 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.639793 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.646970 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.647017 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.654982 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.655025 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.662144 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.662173 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.669787 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.669831 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.676990 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.677016 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.684791 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.684821 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.691799 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.691856 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.695787 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.703169 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.703210 kernel: Failed to create system directory nfs4 Feb 12 19:41:35.346000 audit[3420]: AVC avc: denied { confidentiality } for pid=3420 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.816422 kernel: NFS: Registering the id_resolver key type Feb 12 19:41:35.816528 kernel: Key type id_resolver registered Feb 12 19:41:35.816568 kernel: Key type id_legacy registered Feb 12 19:41:35.346000 audit[3420]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffb760b010 a1=167c04 a2=aaaad6e8e028 a3=aaab14006010 items=0 ppid=51 pid=3420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:35.346000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D006E66737634 Feb 12 19:41:35.823000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.823000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.834862 kernel: Failed to create system directory rpcgss Feb 12 19:41:35.834941 kernel: Failed to create system directory rpcgss Feb 12 19:41:35.823000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.839085 kernel: Failed to create system directory rpcgss Feb 12 19:41:35.823000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.842844 kernel: Failed to create system directory rpcgss Feb 12 19:41:35.842908 kernel: Failed to create system directory rpcgss Feb 12 19:41:35.823000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.823000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.850459 kernel: Failed to create system directory rpcgss Feb 12 19:41:35.823000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.854459 kernel: Failed to create system directory rpcgss Feb 12 19:41:35.854503 kernel: Failed to create system directory rpcgss Feb 12 19:41:35.823000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.823000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.861891 kernel: Failed to create system directory rpcgss Feb 12 19:41:35.823000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.865855 kernel: Failed to create system directory rpcgss Feb 12 19:41:35.870534 kernel: Failed to create system directory rpcgss Feb 12 19:41:35.823000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.875053 kernel: Failed to create system directory rpcgss Feb 12 19:41:35.823000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.878952 kernel: Failed to create system directory rpcgss Feb 12 19:41:35.823000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.882839 kernel: Failed to create system directory rpcgss Feb 12 19:41:35.823000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.886791 kernel: Failed to create system directory rpcgss Feb 12 19:41:35.823000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.890676 kernel: Failed to create system directory rpcgss Feb 12 19:41:35.823000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.894530 kernel: Failed to create system directory rpcgss Feb 12 19:41:35.823000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.898445 kernel: Failed to create system directory rpcgss Feb 12 19:41:35.823000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.902593 kernel: Failed to create system directory rpcgss Feb 12 19:41:35.823000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.906480 kernel: Failed to create system directory rpcgss Feb 12 19:41:35.823000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.910448 kernel: Failed to create system directory rpcgss Feb 12 19:41:35.823000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.914343 kernel: Failed to create system directory rpcgss Feb 12 19:41:35.823000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.918667 kernel: Failed to create system directory rpcgss Feb 12 19:41:35.823000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.922583 kernel: Failed to create system directory rpcgss Feb 12 19:41:35.823000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.926504 kernel: Failed to create system directory rpcgss Feb 12 19:41:35.823000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.930371 kernel: Failed to create system directory rpcgss Feb 12 19:41:35.823000 audit[3421]: AVC avc: denied { confidentiality } for pid=3421 comm="modprobe" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Feb 12 19:41:35.823000 audit[3421]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=ffffb0533010 a1=3e09c a2=aaaad85fe028 a3=aaaaf74a4010 items=0 ppid=51 pid=3421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="modprobe" exe="/usr/bin/kmod" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:35.823000 audit: PROCTITLE proctitle=2F7362696E2F6D6F6470726F6265002D71002D2D007270632D617574682D36 Feb 12 19:41:36.126585 kubelet[1901]: E0212 19:41:36.126490 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:36.348997 nfsidmap[3426]: nss_getpwnam: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.2-a-b351613fb4' Feb 12 19:41:36.360257 nfsidmap[3427]: nss_name_to_gid: name 'root@nfs-server-provisioner.default.svc.cluster.local' does not map into domain '3.2-a-b351613fb4' Feb 12 19:41:36.370000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2725 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:41:36.370000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2725 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:41:36.370000 audit[1]: AVC avc: denied { watch_reads } for pid=1 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2725 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:41:36.370000 audit[1450]: AVC avc: denied { watch_reads } for pid=1450 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2725 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:41:36.370000 audit[1450]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaad8bbc4f0 a2=10 a3=0 items=0 ppid=1 pid=1450 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:36.370000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 19:41:36.370000 audit[1450]: AVC avc: denied { watch_reads } for pid=1450 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2725 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:41:36.370000 audit[1450]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaad8bbc4f0 a2=10 a3=0 items=0 ppid=1 pid=1450 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:36.370000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 19:41:36.370000 audit[1450]: AVC avc: denied { watch_reads } for pid=1450 comm="systemd" path="/run/mount/utab.lock" dev="tmpfs" ino=2725 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:mount_runtime_t:s0 tclass=file permissive=0 Feb 12 19:41:36.370000 audit[1450]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=e a1=aaaad8bbc4f0 a2=10 a3=0 items=0 ppid=1 pid=1450 auid=4294967295 uid=500 gid=500 euid=500 suid=500 fsuid=500 egid=500 sgid=500 fsgid=500 tty=(none) ses=4294967295 comm="systemd" exe="/usr/lib/systemd/systemd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:36.370000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D64002D2D75736572 Feb 12 19:41:36.556924 env[1347]: time="2024-02-12T19:41:36.556814199Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:3611ca90-1fb9-4cca-af7c-dacec6540304,Namespace:default,Attempt:0,}" Feb 12 19:41:36.684656 systemd-networkd[1496]: cali5ec59c6bf6e: Link UP Feb 12 19:41:36.695945 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:41:36.696044 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5ec59c6bf6e: link becomes ready Feb 12 19:41:36.697384 systemd-networkd[1496]: cali5ec59c6bf6e: Gained carrier Feb 12 19:41:36.704544 env[1347]: 2024-02-12 19:41:36.623 [INFO][3429] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {10.200.20.12-k8s-test--pod--1-eth0 default 3611ca90-1fb9-4cca-af7c-dacec6540304 1390 0 2024-02-12 19:41:03 +0000 UTC map[projectcalico.org/namespace:default projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s 10.200.20.12 test-pod-1 eth0 default [] [] [kns.default ksa.default.default] cali5ec59c6bf6e [] []}} ContainerID="1f20187284294effbfbb87867ca98d8128a6581f2a25e5e68165366e02c0c49a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.12-k8s-test--pod--1-" Feb 12 19:41:36.704544 env[1347]: 2024-02-12 19:41:36.623 [INFO][3429] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="1f20187284294effbfbb87867ca98d8128a6581f2a25e5e68165366e02c0c49a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.12-k8s-test--pod--1-eth0" Feb 12 19:41:36.704544 env[1347]: 2024-02-12 19:41:36.645 [INFO][3440] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1f20187284294effbfbb87867ca98d8128a6581f2a25e5e68165366e02c0c49a" HandleID="k8s-pod-network.1f20187284294effbfbb87867ca98d8128a6581f2a25e5e68165366e02c0c49a" Workload="10.200.20.12-k8s-test--pod--1-eth0" Feb 12 19:41:36.704544 env[1347]: 2024-02-12 19:41:36.657 [INFO][3440] ipam_plugin.go 268: Auto assigning IP ContainerID="1f20187284294effbfbb87867ca98d8128a6581f2a25e5e68165366e02c0c49a" HandleID="k8s-pod-network.1f20187284294effbfbb87867ca98d8128a6581f2a25e5e68165366e02c0c49a" Workload="10.200.20.12-k8s-test--pod--1-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000118610), Attrs:map[string]string{"namespace":"default", "node":"10.200.20.12", "pod":"test-pod-1", "timestamp":"2024-02-12 19:41:36.645189413 +0000 UTC"}, Hostname:"10.200.20.12", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:41:36.704544 env[1347]: 2024-02-12 19:41:36.657 [INFO][3440] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:36.704544 env[1347]: 2024-02-12 19:41:36.657 [INFO][3440] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:36.704544 env[1347]: 2024-02-12 19:41:36.657 [INFO][3440] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host '10.200.20.12' Feb 12 19:41:36.704544 env[1347]: 2024-02-12 19:41:36.659 [INFO][3440] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1f20187284294effbfbb87867ca98d8128a6581f2a25e5e68165366e02c0c49a" host="10.200.20.12" Feb 12 19:41:36.704544 env[1347]: 2024-02-12 19:41:36.662 [INFO][3440] ipam.go 372: Looking up existing affinities for host host="10.200.20.12" Feb 12 19:41:36.704544 env[1347]: 2024-02-12 19:41:36.665 [INFO][3440] ipam.go 489: Trying affinity for 192.168.119.0/26 host="10.200.20.12" Feb 12 19:41:36.704544 env[1347]: 2024-02-12 19:41:36.666 [INFO][3440] ipam.go 155: Attempting to load block cidr=192.168.119.0/26 host="10.200.20.12" Feb 12 19:41:36.704544 env[1347]: 2024-02-12 19:41:36.668 [INFO][3440] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.119.0/26 host="10.200.20.12" Feb 12 19:41:36.704544 env[1347]: 2024-02-12 19:41:36.668 [INFO][3440] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.119.0/26 handle="k8s-pod-network.1f20187284294effbfbb87867ca98d8128a6581f2a25e5e68165366e02c0c49a" host="10.200.20.12" Feb 12 19:41:36.704544 env[1347]: 2024-02-12 19:41:36.669 [INFO][3440] ipam.go 1682: Creating new handle: k8s-pod-network.1f20187284294effbfbb87867ca98d8128a6581f2a25e5e68165366e02c0c49a Feb 12 19:41:36.704544 env[1347]: 2024-02-12 19:41:36.672 [INFO][3440] ipam.go 1203: Writing block in order to claim IPs block=192.168.119.0/26 handle="k8s-pod-network.1f20187284294effbfbb87867ca98d8128a6581f2a25e5e68165366e02c0c49a" host="10.200.20.12" Feb 12 19:41:36.704544 env[1347]: 2024-02-12 19:41:36.680 [INFO][3440] ipam.go 1216: Successfully claimed IPs: [192.168.119.4/26] block=192.168.119.0/26 handle="k8s-pod-network.1f20187284294effbfbb87867ca98d8128a6581f2a25e5e68165366e02c0c49a" host="10.200.20.12" Feb 12 19:41:36.704544 env[1347]: 2024-02-12 19:41:36.680 [INFO][3440] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.119.4/26] handle="k8s-pod-network.1f20187284294effbfbb87867ca98d8128a6581f2a25e5e68165366e02c0c49a" host="10.200.20.12" Feb 12 19:41:36.704544 env[1347]: 2024-02-12 19:41:36.680 [INFO][3440] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:36.704544 env[1347]: 2024-02-12 19:41:36.680 [INFO][3440] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.119.4/26] IPv6=[] ContainerID="1f20187284294effbfbb87867ca98d8128a6581f2a25e5e68165366e02c0c49a" HandleID="k8s-pod-network.1f20187284294effbfbb87867ca98d8128a6581f2a25e5e68165366e02c0c49a" Workload="10.200.20.12-k8s-test--pod--1-eth0" Feb 12 19:41:36.704544 env[1347]: 2024-02-12 19:41:36.681 [INFO][3429] k8s.go 385: Populated endpoint ContainerID="1f20187284294effbfbb87867ca98d8128a6581f2a25e5e68165366e02c0c49a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.12-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"3611ca90-1fb9-4cca-af7c-dacec6540304", ResourceVersion:"1390", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 41, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.12", ContainerID:"", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.119.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:36.704544 env[1347]: 2024-02-12 19:41:36.682 [INFO][3429] k8s.go 386: Calico CNI using IPs: [192.168.119.4/32] ContainerID="1f20187284294effbfbb87867ca98d8128a6581f2a25e5e68165366e02c0c49a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.12-k8s-test--pod--1-eth0" Feb 12 19:41:36.705393 env[1347]: 2024-02-12 19:41:36.682 [INFO][3429] dataplane_linux.go 68: Setting the host side veth name to cali5ec59c6bf6e ContainerID="1f20187284294effbfbb87867ca98d8128a6581f2a25e5e68165366e02c0c49a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.12-k8s-test--pod--1-eth0" Feb 12 19:41:36.705393 env[1347]: 2024-02-12 19:41:36.697 [INFO][3429] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="1f20187284294effbfbb87867ca98d8128a6581f2a25e5e68165366e02c0c49a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.12-k8s-test--pod--1-eth0" Feb 12 19:41:36.705393 env[1347]: 2024-02-12 19:41:36.698 [INFO][3429] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="1f20187284294effbfbb87867ca98d8128a6581f2a25e5e68165366e02c0c49a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.12-k8s-test--pod--1-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"10.200.20.12-k8s-test--pod--1-eth0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"3611ca90-1fb9-4cca-af7c-dacec6540304", ResourceVersion:"1390", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 41, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"projectcalico.org/namespace":"default", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"10.200.20.12", ContainerID:"1f20187284294effbfbb87867ca98d8128a6581f2a25e5e68165366e02c0c49a", Pod:"test-pod-1", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.119.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.default", "ksa.default.default"}, InterfaceName:"cali5ec59c6bf6e", MAC:"be:80:18:5c:63:e1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:36.705393 env[1347]: 2024-02-12 19:41:36.703 [INFO][3429] k8s.go 491: Wrote updated endpoint to datastore ContainerID="1f20187284294effbfbb87867ca98d8128a6581f2a25e5e68165366e02c0c49a" Namespace="default" Pod="test-pod-1" WorkloadEndpoint="10.200.20.12-k8s-test--pod--1-eth0" Feb 12 19:41:36.717000 audit[3455]: NETFILTER_CFG table=filter:81 family=2 entries=34 op=nft_register_chain pid=3455 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:41:36.717000 audit[3455]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=17876 a0=3 a1=fffff0d958d0 a2=0 a3=ffff875bbfa8 items=0 ppid=2535 pid=3455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:36.717000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:41:36.727645 env[1347]: time="2024-02-12T19:41:36.727537272Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:41:36.727807 env[1347]: time="2024-02-12T19:41:36.727651992Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:41:36.727807 env[1347]: time="2024-02-12T19:41:36.727678632Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:41:36.727958 env[1347]: time="2024-02-12T19:41:36.727913872Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1f20187284294effbfbb87867ca98d8128a6581f2a25e5e68165366e02c0c49a pid=3468 runtime=io.containerd.runc.v2 Feb 12 19:41:36.742808 systemd[1]: Started cri-containerd-1f20187284294effbfbb87867ca98d8128a6581f2a25e5e68165366e02c0c49a.scope. Feb 12 19:41:36.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.754000 audit: BPF prog-id=114 op=LOAD Feb 12 19:41:36.754000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.754000 audit[3479]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=3468 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:36.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166323031383732383432393465666662666262383738363763613938 Feb 12 19:41:36.755000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.755000 audit[3479]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=3468 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:36.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166323031383732383432393465666662666262383738363763613938 Feb 12 19:41:36.755000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.755000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.755000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.755000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.755000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.755000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.755000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.755000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.755000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.755000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.755000 audit: BPF prog-id=115 op=LOAD Feb 12 19:41:36.755000 audit[3479]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=3468 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:36.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166323031383732383432393465666662666262383738363763613938 Feb 12 19:41:36.756000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.756000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.756000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.756000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.756000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.756000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.756000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.756000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.756000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.756000 audit: BPF prog-id=116 op=LOAD Feb 12 19:41:36.756000 audit[3479]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=3468 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:36.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166323031383732383432393465666662666262383738363763613938 Feb 12 19:41:36.756000 audit: BPF prog-id=116 op=UNLOAD Feb 12 19:41:36.756000 audit: BPF prog-id=115 op=UNLOAD Feb 12 19:41:36.756000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.756000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.756000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.756000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.756000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.756000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.756000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.756000 audit[3479]: AVC avc: denied { perfmon } for pid=3479 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.756000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.756000 audit[3479]: AVC avc: denied { bpf } for pid=3479 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:36.756000 audit: BPF prog-id=117 op=LOAD Feb 12 19:41:36.756000 audit[3479]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=3468 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:36.756000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166323031383732383432393465666662666262383738363763613938 Feb 12 19:41:36.775518 env[1347]: time="2024-02-12T19:41:36.775478796Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:test-pod-1,Uid:3611ca90-1fb9-4cca-af7c-dacec6540304,Namespace:default,Attempt:0,} returns sandbox id \"1f20187284294effbfbb87867ca98d8128a6581f2a25e5e68165366e02c0c49a\"" Feb 12 19:41:36.777898 env[1347]: time="2024-02-12T19:41:36.777718595Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\"" Feb 12 19:41:37.126686 kubelet[1901]: E0212 19:41:37.126650 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:37.165984 env[1347]: time="2024-02-12T19:41:37.165936508Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:37.176038 env[1347]: time="2024-02-12T19:41:37.175990261Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:37.182526 env[1347]: time="2024-02-12T19:41:37.182489696Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx:latest,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:37.188614 env[1347]: time="2024-02-12T19:41:37.188580252Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/nginx@sha256:e34a272f01984c973b1e034e197c02f77dda18981038e3a54e957554ada4fec6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:37.189171 env[1347]: time="2024-02-12T19:41:37.189140811Z" level=info msg="PullImage \"ghcr.io/flatcar/nginx:latest\" returns image reference \"sha256:01bfff6bfbc6f0e8a890bad9e22c5392e6dbfd67def93467db6231d4be1b719b\"" Feb 12 19:41:37.191758 env[1347]: time="2024-02-12T19:41:37.191708130Z" level=info msg="CreateContainer within sandbox \"1f20187284294effbfbb87867ca98d8128a6581f2a25e5e68165366e02c0c49a\" for container &ContainerMetadata{Name:test,Attempt:0,}" Feb 12 19:41:37.226626 env[1347]: time="2024-02-12T19:41:37.226582224Z" level=info msg="CreateContainer within sandbox \"1f20187284294effbfbb87867ca98d8128a6581f2a25e5e68165366e02c0c49a\" for &ContainerMetadata{Name:test,Attempt:0,} returns container id \"a761d939c8244357d1925557c7d8ac7f88dbac7d7ca187f3da3884e98da8cb9d\"" Feb 12 19:41:37.227588 env[1347]: time="2024-02-12T19:41:37.227552703Z" level=info msg="StartContainer for \"a761d939c8244357d1925557c7d8ac7f88dbac7d7ca187f3da3884e98da8cb9d\"" Feb 12 19:41:37.241202 systemd[1]: Started cri-containerd-a761d939c8244357d1925557c7d8ac7f88dbac7d7ca187f3da3884e98da8cb9d.scope. Feb 12 19:41:37.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.251000 audit: BPF prog-id=118 op=LOAD Feb 12 19:41:37.252000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.252000 audit[3511]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3468 pid=3511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:37.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137363164393339633832343433353764313932353535376337643861 Feb 12 19:41:37.252000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.252000 audit[3511]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3468 pid=3511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:37.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137363164393339633832343433353764313932353535376337643861 Feb 12 19:41:37.253000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.253000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.253000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.253000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.253000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.253000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.253000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.253000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.253000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.253000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.253000 audit: BPF prog-id=119 op=LOAD Feb 12 19:41:37.253000 audit[3511]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3468 pid=3511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:37.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137363164393339633832343433353764313932353535376337643861 Feb 12 19:41:37.253000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.253000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.253000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.253000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.253000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.253000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.253000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.253000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.253000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.253000 audit: BPF prog-id=120 op=LOAD Feb 12 19:41:37.253000 audit[3511]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3468 pid=3511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:37.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137363164393339633832343433353764313932353535376337643861 Feb 12 19:41:37.254000 audit: BPF prog-id=120 op=UNLOAD Feb 12 19:41:37.254000 audit: BPF prog-id=119 op=UNLOAD Feb 12 19:41:37.254000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.254000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.254000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.254000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.254000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.254000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.254000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.254000 audit[3511]: AVC avc: denied { perfmon } for pid=3511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.254000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.254000 audit[3511]: AVC avc: denied { bpf } for pid=3511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:37.254000 audit: BPF prog-id=121 op=LOAD Feb 12 19:41:37.254000 audit[3511]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3468 pid=3511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:37.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137363164393339633832343433353764313932353535376337643861 Feb 12 19:41:37.275196 env[1347]: time="2024-02-12T19:41:37.275142588Z" level=info msg="StartContainer for \"a761d939c8244357d1925557c7d8ac7f88dbac7d7ca187f3da3884e98da8cb9d\" returns successfully" Feb 12 19:41:38.127815 kubelet[1901]: E0212 19:41:38.127776 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:38.662873 systemd-networkd[1496]: cali5ec59c6bf6e: Gained IPv6LL Feb 12 19:41:39.078607 kubelet[1901]: E0212 19:41:39.078416 1901 file.go:104] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:39.128710 kubelet[1901]: E0212 19:41:39.128690 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:40.130107 kubelet[1901]: E0212 19:41:40.130075 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:41.131370 kubelet[1901]: E0212 19:41:41.131335 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:42.132249 kubelet[1901]: E0212 19:41:42.132213 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:43.132634 kubelet[1901]: E0212 19:41:43.132602 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:44.133144 kubelet[1901]: E0212 19:41:44.133114 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:44.902772 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:44.918760 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:44.933487 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:44.948155 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:44.963119 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:44.978708 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:44.986858 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:44.986976 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.001784 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.001987 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.017084 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.024540 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.024698 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.048462 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.048705 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.048841 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.064701 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.064898 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.080801 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.080983 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.096293 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.104011 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.104196 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.119273 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.127016 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.127187 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.142681 kubelet[1901]: E0212 19:41:45.135191 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:45.142973 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.143112 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.158117 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.166149 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.174472 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.174645 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.190358 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.190576 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.206692 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.223858 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.224165 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.224288 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.240122 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.240361 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.255620 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.263899 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.271898 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.272577 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.295414 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.295621 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.295723 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.311124 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.319276 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.326754 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.326900 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.342320 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.350531 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.350727 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.366111 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.366293 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.383539 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.383718 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.400053 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.408356 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.416608 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.434973 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.443772 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.452224 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.452347 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.474246 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.474525 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.474640 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.486607 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.486861 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.502953 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.503150 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.520128 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.529810 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.530049 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.545886 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.546086 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.561714 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.561933 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.577524 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.577778 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.606745 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.606993 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.607093 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.618151 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.626340 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.635810 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.635958 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.651959 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.667938 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.668124 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.679243 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.692750 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.692980 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.691082 systemd[1]: run-containerd-runc-k8s.io-660f1f1367f6b3bc7298080bc1c9a1c3390560fcc89fd5189c0f999e88084abb-runc.hsOm9X.mount: Deactivated successfully. Feb 12 19:41:45.715668 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.716044 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.716153 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.733159 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.733483 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.757484 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.757785 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.757949 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.774244 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.784785 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.803933 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.804251 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.812845 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.821286 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.821610 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.839820 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.857333 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.857628 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.875587 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.875858 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.892203 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.892447 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.900766 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.917200 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.917453 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.925671 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.943861 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.944104 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.952485 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.974879 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.975101 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:45.984585 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.001013 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.009381 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.045773 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.046048 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.046164 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.046276 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.046369 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.046464 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.058944 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.059265 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.076638 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.085145 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.100785 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.101084 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.118123 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.135620 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.159856 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.160041 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.160164 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.160268 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.160375 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.160473 kubelet[1901]: E0212 19:41:46.142723 1901 file_linux.go:61] "Unable to read config path" err="path does not exist, ignoring" path="/etc/kubernetes/manifests" Feb 12 19:41:46.169074 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.169382 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.185825 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.219283 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.232700 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.232858 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.232960 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.233084 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.233212 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.245385 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.245573 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.262262 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.262498 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.284755 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.304871 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.305022 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.305124 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.319451 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.319692 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.339234 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.399166 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.407497 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.407643 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.407776 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.407892 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.407991 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.408076 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.408169 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.408266 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.424141 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.424371 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.441051 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.475570 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.499965 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.524803 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.551192 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.559394 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.559494 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.575721 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.585473 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.585672 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.585827 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.585938 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.586044 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.586170 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.586284 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.586385 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.586488 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.586586 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.586679 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.601433 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.601671 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.617875 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.634051 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.649978 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.650095 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.650195 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.658380 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.666778 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.683000 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.706439 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.714530 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.714650 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.714761 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.714870 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.714969 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.738669 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.738941 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.739054 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.754878 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.763175 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.763366 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.779799 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.780004 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.802257 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.802542 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.818654 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.818888 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.835522 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.869631 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.878237 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.886817 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.919417 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.919653 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.919802 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.919941 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.920082 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.920215 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.920352 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:41:46.920485 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#91 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001